last executing test programs: 35m3.012124734s ago: executing program 32 (id=6527): bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x2810000, &(0x7f0000000380)={[{@user_xattr}, {@noquota}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@jqfmt_vfsv1}, {@block_validity}, {@dioread_nolock}, {@noquota}, {@min_batch_time={'min_batch_time', 0x3d, 0x8}}, {@delalloc}, {@user_xattr}, {@quota}]}, 0x1, 0x54f, &(0x7f0000000b00)="$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") sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b7020000ff0d0000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000006f6400000000000045040400010000001704000001000a00b7040000ff0100006a0a00fe0000000085000000bd000000b70000000000000095000000000000009e17f199a68b06d83298a8cdc21ce784909b849d5550ad857d0454d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4eeceb9971e43405d621ffbc9ce000000d8ca56b50d0c010d631f6dde53a9a53608c10556e5734eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fbaa187b81d1106000000000fd60000fd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7e43c5cbd80450f859ce8122a79c3e40000b59b0fc46d6cec3c0802882add4e3179bd4a44f231b6d753a7be428ba953df4aece69311687f4122073a236c3a32efa04137d4524847d2638da3261c8162bb7c7824be6195a66d2e17e122040e1100000000928612a29fc691e4f1f7bd053abb885f39381f1759410b1059f05684261f332d606834669b49ec99320ca7712d7e79bd5bf5ed818ecc7640917f6a559a47db608fcf9f6c131b84e41c354c66838f72b9e12d36e996f316f0812ca83efb30c7f6c6d57c4a64590401eec22523dd712c680013e87f649a1ede7142ca9d5d8a8c9f9b440fe4331ad5532c74d9a31a5d737537f7a2caa30581253d14dd3e92af7dc836686365ae01bdec561c0402b67801267a8df97d2f85426a5963d4fa3e26cc05972c162f223f000000d999e80de00fcbcc02d0aed7bb8f7ba337d59c14f39dcd4aad4139ef6425a9367f1bd1467fc6b95a4df7669839771ce9d5788029901e5a79d8b9990ace8f74087f25ad50c46088000000008000"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x42) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) syz_open_dev$usbfs(&(0x7f0000000000), 0x6b5, 0x41) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="180800000000000000000000000000008510000003000000180000000000000000000000000000009500000000000000bfa000000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x4, 0xf6, &(0x7f0000000740)=""/246, 0xb6df4c32c1d5c814, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000280)={'wg2\x00'}) 34m21.205859316s ago: executing program 33 (id=6607): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000940)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@grpjquota}, {@noquota}, {@abort}, {@noload}, {@nodiscard}]}, 0x64, 0x50a, &(0x7f0000000200)="$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") 22m4.027328647s ago: executing program 6 (id=9376): io_uring_setup(0x60f7, &(0x7f0000000440)={0x0, 0x4000000, 0x40, 0x2, 0x3bd}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000ff0000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000300), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000001c0)={[{@usrquota}, {@grpjquota}, {@nodelalloc}]}, 0x1, 0x4bc, &(0x7f0000000a40)="$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") r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1088d8b8588d72ec29c48f0af5f2d9f51c4b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68af2ad0810000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465ad32b77a74e802a0dc6bf25cca242bc6099ad2300000480006ef6c1ff0900000000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000126abfb0767042361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b6c7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae645ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48fc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1fb8f72cd317902f19e385be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa7956488bef241875f3b4b6ab7929a57affe760e797724f4fce1093b62d7e8c7123d890decacec55bf404e4e1f74b7eed82571be54c72d978cf906df0042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f870b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a998de44aeadea2a40da8daccf080842a486721737390cbf3acb2003016f154772f514216bdf57d2a40d40b51ab67903ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1594e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270bb29b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214d00000000d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c471c784ae7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec30cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd63bed8d31c31c37a373d4efd89f0000377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f0059161c5e0000000000000000000057d77480e0345effff6413258d1f6eb190aa28cbb4bafe34124172e436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fa03b84f63e022fe755f4007a4a899eaf52c4f491d8e97c862e29e457060000007ac691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104ebc1581848f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c716357d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c24936615ee68538e8fddd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426ca85e82ccf821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ad6acf5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba1c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63c41cbde2ba66ad81168070c8c6e18a6e452a31bdc4a60d637545ed4c8a1c649c3ce54ad3e16304d06a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c5140200000054d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c7340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a3bc38613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b9e6626f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f14eafe4b28ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1bfeef448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae0040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483f02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e9180100000000000000654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732e74dd690c57bdfdc1f069f9491bca7a8c59363799be70018c25ece5ad7307dc7a95c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2cdfb7fea73ca18874664d60a4b9423f3297bc8eb91b4ee1d73272ab28a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece98c077b358e752b439132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae2676384ff799783f55d7e5a1a092a01b965dc99cb7a9d98440c355927629f2bcf9dc2396eb2f5d25829715b24327642ac48f1201014a95e0e65e12cdf27e19043e3c5d3e798375cead35b9a93190a52cdecaaccc854a1d41ef365303f0e9b4fc969c9dab6df5e8a795b140fcc09e8a7b694d12932917facd8ceaa4e2d0d16bb0b95387fcd5ff136d8abddf94daf442bbff744591931872a36cf921ad69f2127386e8b0f9afee4da8d3fbec809fbb3ca0fded2859cf25d4c6155d396c5b9bd1a928923123f63f4c40688eae69990a9419456247bbaeb7948de84d2ff875414883bb1e503d4bfebc01bc12a53ea06bf38e571157bd642dac25dbee7832c58378374a39483d6721eec96c28911db21c0c006b42afc90000000000000000000000700000000000000000008ce4ea442c1a207108b35511186c5e860278f6463f52f3990ce08b1bfccc3cff4b5ae27b610aa9ba11b47d4f94c439e055cdbb2b12c983885c93ea4ab4ca1e02d831ae162ee104"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001d40)={&(0x7f00000009c0)='sched_switch\x00', r2}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000180)={@loopback, @dev}, &(0x7f0000000240)=0xc) io_setup(0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000001c0)={[{@usrquota}, {@grpjquota}, {@nodelalloc}]}, 0x1, 0x4bc, &(0x7f0000000a40)="$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") r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000100000000000000000000850000006d000000850000009e00000095"], 0x0, 0x4, 0xad, &(0x7f00000003c0)=""/173, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000180)='./file0/file0\x00') mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) syz_clone(0x640c7011, 0x0, 0x0, 0x0, 0x0, 0x0) 21m59.389132741s ago: executing program 6 (id=9386): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f0000000d00)='sched_switch\x00', r0}, 0x10) socket$inet6(0xa, 0x3, 0x2) socket$inet6_udplite(0xa, 0x2, 0x88) 21m57.266832077s ago: executing program 6 (id=9390): io_submit(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffc000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) syz_open_dev$rtc(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB='\x00'/13, @ANYBLOB], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000001640)='kfree\x00'}, 0x10) syz_emit_ethernet(0x46, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd62561699001000fffc000000000000000000000000000001200100000000000000023b00000000000000c2040001"], 0x0) 21m55.921993437s ago: executing program 6 (id=9394): syz_mount_image$exfat(&(0x7f0000000340), &(0x7f0000000000)='./file0\x00', 0x800, &(0x7f0000000240)=ANY=[@ANYBLOB='iocharset=iaciceland,umask=00000000000000000000005,gid=', @ANYRESHEX=0x0, @ANYBLOB=',errors=continue,iocharset=iso8859-5,errors=continue,errors=continue,errors=remount-ro,iocharset=maccroatian,errors=continue,\x00'], 0x1, 0x1524, &(0x7f0000002280)="$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") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x200052, 0x0) 21m55.708914329s ago: executing program 6 (id=9396): io_submit(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffc000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r4}, 0x18) syz_open_dev$rtc(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB='\x00'/13, @ANYBLOB], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000001640)='kfree\x00'}, 0x10) syz_emit_ethernet(0x46, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd62561699001000fffc000000000000000000000000000001200100000000000000023b00000000000000c2040001"], 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000000)={0x0, 0x0, "ec9fe44d4dbe56a65274d7c727e7e53c1bb714e315eeb406bfdd73835e57efa94b1a0275781c647aa7e3470c6028642b17832b10b386a6f73791011c26a9aa141f406e312295ee620a9a46577b9249b738fe7750bec83bf6ed5b67213fa7d6c0823fd154ed29ed7eff0d26ff199ee1ff379742c3f0b46caa357d70ee438f901d7645c3f87e4b21482b76f2ad8eaac090272081f98fd2e3e5a63e006204df635e731a5bfcf142f4529517454618de595cd179445b4bdbf698b9986356f0ebf7d25a57774ef474f86a3ad24ae9f0bf94b99e6b87de5f79d383d05bb32701daed400785a49788f08caecc9e0c48a3740bbe6e1c1fd400cfdfe756bcb7d08e36655c"}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x1ff) 21m55.56983412s ago: executing program 6 (id=9397): mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a5000000080000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) write$FUSE_DIRENTPLUS(r2, &(0x7f00000012c0)=ANY=[@ANYBLOB="b0"], 0xb0) getresuid(&(0x7f0000000440), &(0x7f0000000400), &(0x7f00000004c0)=0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',privport,access=', @ANYRESDEC=r5]) 21m55.459179981s ago: executing program 34 (id=9397): mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a5000000080000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) write$FUSE_DIRENTPLUS(r2, &(0x7f00000012c0)=ANY=[@ANYBLOB="b0"], 0xb0) getresuid(&(0x7f0000000440), &(0x7f0000000400), &(0x7f00000004c0)=0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',privport,access=', @ANYRESDEC=r5]) 21m0.168204763s ago: executing program 2 (id=9545): r0 = socket(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffc000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r5}, 0x18) syz_open_dev$rtc(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB='\x00'/13, @ANYBLOB], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000001640)='kfree\x00'}, 0x10) syz_emit_ethernet(0x46, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd62561699001000fffc000000000000000000000000000001200100000000000000023b00000000000000c2040001"], 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, &(0x7f0000000000)={0x0, 0x0, "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"}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x200, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x88}, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'tunl0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4400000010000104000000040000000000000000", @ANYRES32=r7, @ANYBLOB="00000000000000002400128009000100697069700000000014000280050009008900000005000a"], 0x44}}, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 20m58.403828726s ago: executing program 2 (id=9550): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000240)=@framed={{}, [@map_fd={0x18, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0)="900000001c001f4d154a817393278bff0a80a578020000000104740014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000760700c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b", 0x72, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x1, 0xf000, 0x2000, &(0x7f0000f9a000/0x2000)=nil}) r3 = dup(r2) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xc, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000040)=@x86={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7fff, 0x0, 0x0, 0x40}) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f00000000c0)=0xffff) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20m57.852898031s ago: executing program 2 (id=9553): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() io_setup(0x80000000, &(0x7f0000000180)) sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) syz_mount_image$f2fs(&(0x7f0000000140), &(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f00000004c0)={[{@nodiscard}, {}, {@acl}, {@alloc_mode_reuse}, {@discard_unit_section}, {@disable_roll_forward}, {@fault_injection={'fault_injection', 0x3d, 0x7}}, {@nouser_xattr}, {@prjjquota}, {@user_xattr}, {@data_flush}, {@adaptive_mode}, {@jqfmt_vfsold}, {@noinline_dentry}]}, 0x1, 0x5505, &(0x7f0000002480)="$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") 20m55.621731477s ago: executing program 2 (id=9556): gettid() syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000380)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@resgid}, {@data_err_ignore}, {@grpquota}, {@nobh}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000001080)="$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") r0 = open(&(0x7f0000000140)='./file1\x00', 0x40842, 0x21) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x2000, 0x0, 0x3) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2004090, &(0x7f0000000540), 0x81, 0x7a5, &(0x7f0000000f80)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x192) write$cgroup_type(r2, &(0x7f0000000200), 0x175d9003) write$FUSE_WRITE(r1, &(0x7f00000000c0)={0x18}, 0xfffffdef) 20m53.480991853s ago: executing program 2 (id=9565): openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket(0x1e, 0x4, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x10, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') lseek(r5, 0x289e0cb5, 0x0) 20m53.184441645s ago: executing program 2 (id=9566): socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0500000004000000080000000a"], 0x48) close(0x3) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x4000) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x3, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x101042, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000240)={@broadcast, @empty, @val={@void, {0x8100, 0x0, 0x0, 0x2}}, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x8100, 0x0, 0x110, [0x8, 0x8]}, {0x0, 0x0, 0x0, 0x0, 0x11}}}}}}, 0x0) 20m52.962672926s ago: executing program 35 (id=9566): socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0500000004000000080000000a"], 0x48) close(0x3) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x4000) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x3, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x101042, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000240)={@broadcast, @empty, @val={@void, {0x8100, 0x0, 0x0, 0x2}}, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x8100, 0x0, 0x110, [0x8, 0x8]}, {0x0, 0x0, 0x0, 0x0, 0x11}}}}}}, 0x0) 20m15.01484765s ago: executing program 8 (id=9716): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) r2 = gettid() r3 = gettid() tkill(r2, 0x12) tkill(r2, 0x1) tkill(r3, 0x14) 20m14.873655691s ago: executing program 8 (id=9718): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/13, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r4}, 0x18) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f0000000200)={[{@jqfmt_vfsold}, {@max_batch_time={'max_batch_time', 0x3d, 0x1}}, {@debug}, {@noload}, {@nombcache}, {@quota}, {@init_itable_val={'init_itable', 0x3d, 0x6}}, {@barrier_val={'barrier', 0x3d, 0x80}}]}, 0xfe, 0x46c, &(0x7f0000001380)="$eJzs3M1vFOUfAPDvTF94+/FrRXwBQapoJL60tLzIwYtGEw6amOgB46m2hVQWamhNhBCtHvBoSLwb/wvjSS9GvWjiVe+GhBguoF7WzM4MLMtu2aXbLrCfTzLd55l5us/znZln95l5djeAvjWW/Uki/hcRv0fESJ69ucBY/nDtyvmZv6+cn0miWn3rr6RW7uqV8zNl0fL/tuSZarXIb2hS74V3I6YrlbkzRX5i6dQHE4tnz70wf2r6xNyJudNTR44cPLB7+PDUoa7EmcV1defHC7t2HH3n4hszxy6+91OSRh53NMTRLWP53m3q6W5X1mNb69LJYP2WPb/cSDc7E+ilgYjIDtdQrf+PxEBsur5tJF77rKeNA9ZUtVqtrvCqvFwF7mNJ9LoFQG+Ub/TZ9W+5rNPQ465w+eX8AiiL+1qx5FsGI80Te4Yarm+7aSwiji3/81W2xBrdhwAAqPddNv55vtn4L42H88Rw9uf/xRzKaEQ8EBHbIuLBiNgeEQ9F1Mo+EhGPdlh/4wzJreOf9NIdB9eGbPz3UjG3dfP4Ly2LjA4Uua21+IeS4/OVuf3FPtkXQxuOzydzkyvU8f2rv33Ralv9+C9bsvrLsWDRjkuDDTfoZqeXplcTc73Ln0bsHGwWfxLlNE4SETsiYucd1jH/7GDLbbePfwWtn7Zt1a8jnsmP/3I0xF9KWs5PTr54eOrQxMaozO2fKM+KW/3864U3W9W/qvi7IDv+m5ue/9fjH002RiyePXeyNl+72HkdF/74vOU1TYfn/9Gtxfk/nLxdWzFcbPhoemnpzGTEcPL6reunbjxbmS/LZ/Hv29u8/2+LG3visYjYFRG7I+Lx7KKwaPsTEfFkROxdIf4fX3nq/c7jX5+50iz+2dsd/6g//p0nBk7+8O3t498YEa2O/8Faal+xpp3Xv3YbuJp9BwAAAPeK/DPwSTp+PZ2m4+P5Z/i3x+a0srC49NzxhQ9Pz+aflR+NobS80zVSdz90srg3XOanGvIHivvGXw5squXHZxYqs70OHvrclhb9P/PnQK9bB6y5LsyjAfco/R/6l/4P/SnR/6Gv6f/Qv5r1/09alh7/Zk0bA6wr7//Qv9ro/8v5Q+tRAXBv8v4P/Uv/h77U8rvx6aq+8r/uiX+L3zO8W9pz/ycivSuacf8nBtv+MYsOEtWRvP9nazY0LdPrVyYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDu+C8AAP//F0nluw==") socket$netlink(0x10, 0x3, 0x0) r5 = inotify_init() setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000300)={{0x2e, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x4, 'lblcr\x00', 0x12, 0x9, 0x9}, {@private=0xa010102, 0x4e20, 0x3, 0x7, 0x5, 0xfffffffa}}, 0x44) r6 = inotify_add_watch(r5, &(0x7f0000000280)='.\x00', 0x25000001) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000f00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1) ptrace(0x4208, r1) inotify_rm_watch(r5, r6) bpf$PROG_LOAD(0x5, 0x0, 0x0) 20m11.497814956s ago: executing program 8 (id=9724): r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000240)={0x2042, 0x1}, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800, &(0x7f0000000700)={[{@grpid}, {@orlov}]}, 0xff, 0x49b, &(0x7f0000001040)="$eJzs3MtvVNUfAPDvnbY8fjzaHyIKglbQSHy0tKCycKFGExeamOgCl7UtiAzU0JoIabQYg0tD4t64NPEvcOfGqAtj4lYTl4aEaGNCcTXmvugwnSltaTvS+XyS6ZxzH3PO9957Zs69p/cG0LH60z9JxPaI+DUievPsrQv0529zs9OjN2anR5Oo1d74M8mWuz47PVouWq63rcgcrkRUPkni+WRhuZMXLp4ZqVbHzxf5wamz7w1OXrj41OmzI6fGT42fGz5+/NjRoWefGX56VeJM47q+78OJ/XtfeevKa6Mnrrz9w9dptfYcyOfXx3FbN5oE1ER/utX+qmUa5z26jLrfDXbUpZPuNlaEZemKiHR39WTtvze6Yn7n9cbLH7dec/P6VBBYM+lv0yIteaYGbGBJtLsGQHuUP/Tp+W/5Wqeux3/CtRciNhXpudnp0bmb8XdHpZjes4bl90fEiZl/vkhfsdzrEAAAK5D1bZ5s1v+rxJ7sPR/r2FmMofRFxP8jYldE3BMRuyPi3ohs2fsi4v585VrvEsvvb8gv7P9Urjat8ypJ+3/P1fX95uriL976uorcjiz+nuTk6er4kWKbHI6ezWl+aJEyvn3pl89azavv/6WvtPyyL1hU4Gp3wwW6sZGpkdXaCNcuRezrbhZ/cnMkID0C9kbEvuV99M4ycfrxr/a3Wuj28S9iFcaZal9GPJbv/5loiL+ULD4+ObglquNHBsujYqEff778eqvy7yj+VXDt4AN5Yn7/NyzR+3eSj9f2RLU6fn5y+WVc/u3Tluc0Kz3+NyVvZmPWP72TT/tgZGrq/FDEpuTVLF+e02XTh+fXLfPl8unxf/hQ8/a/q1gnjT/dSulBfCAiHoyIh4q6PxwRByPi0CLxf//iI+8uEn8SSbRv/1+KGGv6/Xfz+O9L6sfrV5DoOvPdN61GzOv3fy1ptf+PxUz2XZvLvv9uY6kVvMPNBwAAAHeFSkRsj6QykKf7t0elMjCQ/w//7vhfpToxOfXEyYn3z43l9wj0RU+lvNLVW3c9dCiZKT4xzw8X14rL+UeL68afd23N8gOjE9WxNscOnW7bre0/yvaf+qOr3bUD1pz7taBzNbb/SpvqAay/pfz+OxeAjenW9r8l/bO1XXUB1pfzf+hczdr/Rw15/X/YmBY+AOj3Jo+sAzYi/X/oXNo/dC7tHzpSfif8lVjJff0rT5Q3C6z8c7Ys+Q7/TkmUT7xYy7K2xvyUqLQ95A5KpC1mfQudf4YKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADA3ezfAAAA//+5XeWQ") mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) syz_open_dev$tty1(0xc, 0x4, 0x3) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = creat(&(0x7f0000000180)='./file2\x00', 0x71283578ac7c5cd) write$binfmt_elf64(r6, &(0x7f0000000000)=ANY=[], 0xfd14) 20m7.715487014s ago: executing program 8 (id=9729): prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$erofs(&(0x7f0000000380), &(0x7f0000000140)='./file0\x00', 0x4000, &(0x7f0000000d40)=ANY=[], 0x1, 0x224, &(0x7f0000001600)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) write$FUSE_LK(r5, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x8000000000000000, 0x4}}}, 0x28) getdents64(r5, &(0x7f0000001280)=""/4089, 0xff9) mknodat$loop(0xffffffffffffff9c, 0x0, 0x6004, 0x1) quotactl_fd$Q_SETQUOTA(r1, 0xffffffff80000801, 0x0, &(0x7f0000000440)={0x919, 0xc, 0x7c, 0x401, 0x80, 0x5, 0x2, 0x1ff, 0x7}) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x4, 0x8, 0x0, 0x81, 0xfffffffd, 0x3}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 20m6.519381953s ago: executing program 8 (id=9731): r0 = socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r1 = fcntl$getown(r0, 0x9) sched_setscheduler(r1, 0x2, &(0x7f00000000c0)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000780)={@broadcast, @random="6487a2bed3d6", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x300, 0x0, 0x0, 0x6c, 0x0, @private}, {{}, {}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1}}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000280)={[{@nogrpid}, {@jqfmt_vfsv0}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@debug}, {@nombcache}, {@quota}, {@nolazytime}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") r7 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0x8004587d, &(0x7f0000000080)={@id={0x2, 0x0, @c}}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008012, &(0x7f0000001e80), 0x1, 0x555, &(0x7f00000024c0)="$eJzs3c+PG1cdAPDvzP5y07SbQA9QAQlQCCiKnXXaqOql5QJCVSVExQFxSJddZ7XEjsPaW7rLSmz/BpBA4gR/AgckDkg9ceDGEYkDQpQDUoEVKIvEwWjG3o2btclQe+1m/flIk3kzb2a+73kz856fd/0CmFmXI2I/IhYj4o2IWO7tT3pLvNJdsuPuH+ytHR7srSXR6bz+9yTPz/ZF3zmZJ3vXLEXE178S8e3kZNzWzu6d1Xq9ttXbrrQb9yqtnd1rm43VjdpG7W61enPl5vUXb7xQHVtdLzV+8d6XN1/9xq9/9cl3f7f/xe9nxTrfy+uvxzh1q75wHCczHxGvnkawKZjrrRenXA4+mDQiPhIRn8nv/+WYy/93AgBnWaezHJ3l/m0A4KxL8zGwJC1HRJr2OgHl7hjeM3EurTdb7au3m9t317tjZRdiIb29Wa9dv7j0h+/mBy8k2fZKnpfnJxH7tWrfdpZ/IyIuRsSPlp7It8trzfr6dLo8ADDznuxv/yPiX0tpWi4XOnXAp3oAwGOjNO0CAAATp/0HgNmj/QeA2VOg/e992L9/6mUBACbD+38AmD3afwCYPdp/AJgpX3vttWzpHPa+/3r9zZ3tO803r63XWnfKje218lpz6155o9ncyL+zp/Go69WbzXsrz8f2W5V2rdWutHZ2bzWa23fbt/Lv9b5VW5hIrQCA/+XipXd+n0TE/ktP5Ev0zeWgrYazLS009peefkGAiZsb5WQdBHisme0LZlehJjzvJPz21MsCTMfAL/MuDUy+30/+jyB+zwg+VK58vPj4vzme4Wwxsg+z64ON/7889nIAk2f8H2ZXp5M8POf/4nEWAHAmjfArfJ0fjKsTAkzVoybzHsvn/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHDGnI+I70SSlvO5wNPs37RcjngqIi7EQnJ7s167HhFPx6WIWFjKtlemXWgAYETpX5Pe/F9Xlp87/3DuYvLvpXwdEd/76es/fmu13d5ayfb/43j/0tH0YdUH540wryAAUNyfixyUt9/V3rrvjfz9g721o+UUy3jCe186nnx07fBgL1+6OfPR6XQ6EaW8L3Hun0nM984pRcSzETE3hvj7b0fExwbVP8nHRi70Zj7tjx+92E9NNH76vvhpntddZy/fR8dQFpg172TPn1cG3X9pXM7Xg+//Uv6EGl3+/CtFHD37Dvviz/cizQ2In93zl4vGeP43Xz2xs7PczXs74tn5QfGT4/jJkPjPFYz/x0986ocvD8nr/CziSgyO3x+r0m7cq7R2dq9tNlY3ahu1u9XqzZWb11+88UK1ko9RV45Gqk/620tXnx5Wtqz+54bELw2s/+LxuZ8rWP+f/+eNb336webSw/G/8NnBP/9nBsbvytrEzxeMv3rul0On787irw+p/6N+/lcLxn/3L7vrBQ8FACagtbN7Z7Ver22NlMjehY7jOicSWRGLHXzUXRwt6J8iT4zpZRmSyDpjRQ5eGM+rWvw1HFti/rivON4rfzO74sRq0U2kY6/FSIn7k4o1tUcSMCEPbvpplwQAAAAAAAAAAAAAABhmEn+6NO06AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcHb9NwAA//8uA8Fj") r8 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r8, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x2) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) 20m4.545119858s ago: executing program 8 (id=9738): r0 = inotify_init1(0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0200000004000000800000000500000000100000", @ANYRES32], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="11000000040000000400000009000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0x1, 0x0, r6, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r7}, &(0x7f0000000840), &(0x7f0000000880)=r6}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x2200, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r10, 0x4008ae89, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000001500001b0001c0"]) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x2054008, &(0x7f0000000640), 0xfc, 0x7c7, &(0x7f0000001100)="$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") syz_pidfd_open(0x0, 0x0) r11 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r11, 0x1, r0, &(0x7f0000000240)={0x20000006}) 19m48.779302526s ago: executing program 36 (id=9738): r0 = inotify_init1(0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0200000004000000800000000500000000100000", @ANYRES32], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="11000000040000000400000009000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0x1, 0x0, r6, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r7}, &(0x7f0000000840), &(0x7f0000000880)=r6}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x2200, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r10, 0x4008ae89, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000001500001b0001c0"]) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x2054008, &(0x7f0000000640), 0xfc, 0x7c7, &(0x7f0000001100)="$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") syz_pidfd_open(0x0, 0x0) r11 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r11, 0x1, r0, &(0x7f0000000240)={0x20000006}) 15m4.921295875s ago: executing program 3 (id=10724): r0 = open(&(0x7f0000000ec0)='./bus\x00', 0x14927e, 0x8d) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x60600, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 15m4.899610945s ago: executing program 3 (id=10726): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff017f000e0800395032303030"], 0x15) r4 = dup(r3) write$FUSE_BMAP(r4, &(0x7f0000000340)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) utime(&(0x7f0000000200)='./file0\x00', 0x0) 15m4.849894756s ago: executing program 3 (id=10727): io_submit(0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffc000) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r2}, 0x18) syz_open_dev$rtc(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000001640)='kfree\x00'}, 0x10) syz_emit_ethernet(0x46, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd62561699001000fffc000000000000000000000000000001200100000000000000023b00000000000000c2040001"], 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$USBDEVFS_DISCONNECT_CLAIM(r3, 0x8108551b, &(0x7f0000000000)={0x0, 0x0, "ec9fe44d4dbe56a65274d7c727e7e53c1bb714e315eeb406bfdd73835e57efa94b1a0275781c647aa7e3470c6028642b17832b10b386a6f73791011c26a9aa141f406e312295ee620a9a46577b9249b738fe7750bec83bf6ed5b67213fa7d6c0823fd154ed29ed7eff0d26ff199ee1ff379742c3f0b46caa357d70ee438f901d7645c3f87e4b21482b76f2ad8eaac090272081f98fd2e3e5a63e006204df635e731a5bfcf142f4529517454618de595cd179445b4bdbf698b9986356f0ebf7d25a57774ef474f86a3ad24ae9f0bf94b99e6b87de5f79d383d05bb32701daed400785a49788f08caecc9e0c48a3740bbe6e1c1fd400cfdfe756bcb7d08e36655c"}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x1ff) 15m4.682179547s ago: executing program 3 (id=10729): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$USBDEVFS_SUBMITURB(r3, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x7995}, 0xfff7, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) 15m4.615026247s ago: executing program 3 (id=10731): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000069c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) ppoll(0x0, 0x0, &(0x7f0000000300)={0x0, 0x3938700}, 0x0, 0x0) 15m4.23917146s ago: executing program 3 (id=10732): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="18001000000007e62108120361920000616505e945919046ed970b796d7bfb00000d9500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f00000008c0)='GPL\x00', 0x9, 0x0, 0x0, 0x1e00, 0x19, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000940)='kmem_cache_free\x00', r0, 0x0, 0x10}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) r4 = epoll_create1(0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000800), 0x101007, 0x0) preadv(r5, 0x0, 0x0, 0x81, 0x8000) epoll_wait(r4, &(0x7f0000001e40)=[{}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x9, 0x3}, @func_proto, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}}, &(0x7f0000000100)=""/223, 0x3e, 0xdf, 0x1, 0x0, 0x0, @void, @value}, 0x20) read$FUSE(0xffffffffffffffff, &(0x7f0000002080)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setfsuid(r6) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x800714, &(0x7f0000000000)={[{@nobarrier}]}, 0xff, 0x485, &(0x7f0000001040)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x10) syz_mount_image$fuse(0x0, &(0x7f0000001040)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file2'}}, {@nfs_export_on}], [], 0x2c}) clock_gettime(0x0, &(0x7f0000000780)) 14m49.183539839s ago: executing program 37 (id=10732): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="18001000000007e62108120361920000616505e945919046ed970b796d7bfb00000d9500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f00000008c0)='GPL\x00', 0x9, 0x0, 0x0, 0x1e00, 0x19, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000940)='kmem_cache_free\x00', r0, 0x0, 0x10}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) r4 = epoll_create1(0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000800), 0x101007, 0x0) preadv(r5, 0x0, 0x0, 0x81, 0x8000) epoll_wait(r4, &(0x7f0000001e40)=[{}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x9, 0x3}, @func_proto, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}}, &(0x7f0000000100)=""/223, 0x3e, 0xdf, 0x1, 0x0, 0x0, @void, @value}, 0x20) read$FUSE(0xffffffffffffffff, &(0x7f0000002080)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setfsuid(r6) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x800714, &(0x7f0000000000)={[{@nobarrier}]}, 0xff, 0x485, &(0x7f0000001040)="$eJzs3M9rHFUcAPDvTJL+bhNrrba2Gq1i8UfSpFV78KCi4EFB0EM9xiSttdtGmgi2BI0i9SgF7+JR8C/w5kXUgwheFTxKoWgQmnqKzK9mu9mkSZpkbfbzgc2+t/Nm3/vOzNt9My+zAbSt3uxPErEjIn6LiO4ie3OB3uJpZnpy+Pr05HASs7Nv/JXk5a5NTw5XRav1tpeZw2lE+mkSzyfz6x2/cPHMUK02er7M90+cfa9//MLFp06fHTo1emr03ODx48eODjz7zODTqxJnFte1/R+OHdj3yluXXxs+cfntH7/JmrX3YLG8Po5but4koCZ6s63292yucdmjy2j7nWBnXTrpbGFDWJaOiMh2V1fe/7ujI+Z2Xne8/ElLGwesqey7afPCi6dmgQ0siVa3AGiN6os+O/+tHus09PhfuPpCxKYyPTM9OTxzI/7OSMvXu9aw/t6IODH175fZI5Z7HQIAYAXysc2TzcZ/aezNn4u5jl3lHEpPRNwVEbsj4u6I2BMR90TkZe+NiPuKlWe7l1h/b0N+/vgnvdK0zaskG/89Vzf2m6mLv3zq6ShzO/P4u5KTp2ujR8ptcji6Nmf5gUXq+O6lXz9faFn9+C97ZPVXY8GyAVc6Gy7QjQxNDK3WRrj6ccT+zmbxJzdmArIjYF9E7F/eW++qEqcf//rAQoVuHf8iVmGeafariMeK/T8VDfFXksXnJ/u3RG30SH91VMz30y+XXl+o/tuKfxVk+3/bzcd/Q4nuf5JivrYrarXR8+PLr+PS758teE6z0uN/U/JmPmf98zvFax8MTUycH4jYlLya56tzuvz1wbl1q3xVPov/8KHm/X93uU4W//0RkR3EByPigYh4sGz7QxHxcEQcWiT+H1585N1F4k8iiZbu/5Gmn383jv+epH6+fgWJjjPff7vQjPnS9v+xmMo/awv5598tLLWBt7n5AAAA4I6QRsSOSNK+It27I9K0r6/4H/49sS2tjY1PPHFy7P1zI8U9Aj3RlVZXurrrrocOJFPlOxb5wfJacbX8aHnd+IuOrXm+b3isNtLi2KHdbb+5/0fV/zN/drS6dcCac78WtK/G/p+2qB3A+lvK979zAdiYmvT/ra1oB7D+nP9D+2rW/z9qyBv/w8Y0v///0eQn64CNyPgf2pf+D+1L/4e2dDv39a88Ud0ssPL32bLkO/zbJVH94sVa1rU15l6JtOUht1Ei6zHrW+ncb6gAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADcyf4LAAD///ss5ts=") mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x10) syz_mount_image$fuse(0x0, &(0x7f0000001040)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file2'}}, {@nfs_export_on}], [], 0x2c}) clock_gettime(0x0, &(0x7f0000000780)) 12m38.323547995s ago: executing program 5 (id=11231): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f00000001c0)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffc4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000880)=""/166}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) ustat(0x7fac, 0x0) 12m36.873964755s ago: executing program 5 (id=11237): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) close(0x4) 12m36.780449076s ago: executing program 5 (id=11239): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff017f000e0800395032303030"], 0x15) r4 = dup(r3) write$FUSE_BMAP(r4, &(0x7f0000000340)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r4, 0x0, 0xb0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) 12m36.741299676s ago: executing program 5 (id=11240): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="18001000000007e62108120361920000616505e945919046ed970b796d7bfb00000d9500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000940)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x10}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) r4 = epoll_create1(0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000800), 0x101007, 0x0) preadv(r5, 0x0, 0x0, 0x81, 0x8000) epoll_wait(r4, &(0x7f0000001e40)=[{}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x9, 0x3}, @func_proto, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}}, &(0x7f0000000100)=""/223, 0x3e, 0xdf, 0x1, 0x0, 0x0, @void, @value}, 0x20) read$FUSE(0xffffffffffffffff, &(0x7f0000002080)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setfsuid(r6) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x800714, &(0x7f0000000000)={[{@nobarrier}]}, 0xff, 0x485, &(0x7f0000001040)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x10) syz_mount_image$fuse(0x0, &(0x7f0000001040)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file2'}}, {@nfs_export_on}], [], 0x2c}) clock_gettime(0x0, &(0x7f0000000780)) 12m32.18608084s ago: executing program 5 (id=11244): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x123c02, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="000000000000000000001006dc908b0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r4}, 0x4) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000840)={'hsr0\x00', 0x2000}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba0700000000ebffffff0000f7ffff00"}) r7 = syz_open_pts(r6, 0x0) ioctl$TCSETAF(r7, 0x5408, &(0x7f0000000340)={0x0, 0x0, 0xa, 0x1, 0xc, "00000000dc705800"}) r8 = dup3(r7, r6, 0x0) read$watch_queue(r8, &(0x7f0000001e00)=""/4101, 0x1005) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000180)) statx(r8, &(0x7f0000000180)='./bus\x00', 0x2000, 0x10, &(0x7f0000000740)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 12m23.408637453s ago: executing program 5 (id=11274): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r1 = getpid() r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000005000000ff0f00000400000005"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000000c0)='asymmetric\x00', 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000880)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x168, 0x9403, 0x4, 0x2a0, 0x2c0, 0x2a0, 0x4a8, 0x3d8, 0x2a0, 0x3d8, 0x3, 0x0, {[{{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @multicast2}, [], [0xffffff00, 0xffffff00], 'vxcan1\x00', 'wg1\x00', {}, {}, 0x32}, 0x0, 0xf8, 0x168, 0x0, {}, [@common=@inet=@socket3={{0x28}}, @common=@inet=@socket3={{0x28}, 0x5}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x3ff, 0x3, 0x3, 0x0, 0x0, "37d090c5e92e35eae3ec20dee4a6ad6b2d305fa90e4aaf98ef44205c6bb383adc6b5fb91ef9a8fb8a6693ed49591210f1eff265befc5aa114b238a1a0842df72"}}}, {{@uncond, 0x0, 0xd0, 0x138, 0x0, {}, [@common=@eui64={{0x28}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x2, 0x4, 0x2145, 0xaefa, 'snmp_trap\x00', 'syz1\x00', {0x8}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) syz_mount_image$exfat(&(0x7f0000000040), &(0x7f0000001b40)='./file0\x00', 0x208008de, &(0x7f0000001b80)=ANY=[@ANYBLOB='utf8,errors=continue,namecase=1,utf8,gid=', @ANYRESHEX=0x0, @ANYBLOB=',umask=00000000000000000000077,umask=00000000000000000005676,uid=', @ANYRESHEX=0x0, @ANYRES16, @ANYRESHEX=0x0, @ANYBLOB="2c000ca8768ddddc191573cbd33da79641936c9de64e264f331d1b50f4c4f54702f51dcbddb39c14c19175f07a639bb65ea608fbf6fadf5d8da30ace1281bed3e61b084526e10dbe921dad84fbcabc5791f52445cb76b789ed377aa0cd17309c4df04d525e8af05fb246b33836d90656cd2daa991b916be40df3bd607ae5672e1bb90730d0ff03000000000000c5f0cf287ea707c1fc66165f74e7d8a78c37a4b86907cec1df06da3611f616718d88770a2520ceb039bc06ef4d1183"], 0x1, 0x1506, &(0x7f0000001d00)="$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") ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'macsec0\x00', @random="010000201000"}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_create1(0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000021000f0000f901000000000002"], 0x1c}}, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x12) 12m7.355250348s ago: executing program 38 (id=11274): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r1 = getpid() r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000005000000ff0f00000400000005"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000000c0)='asymmetric\x00', 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000880)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x168, 0x9403, 0x4, 0x2a0, 0x2c0, 0x2a0, 0x4a8, 0x3d8, 0x2a0, 0x3d8, 0x3, 0x0, {[{{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @multicast2}, [], [0xffffff00, 0xffffff00], 'vxcan1\x00', 'wg1\x00', {}, {}, 0x32}, 0x0, 0xf8, 0x168, 0x0, {}, [@common=@inet=@socket3={{0x28}}, @common=@inet=@socket3={{0x28}, 0x5}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x3ff, 0x3, 0x3, 0x0, 0x0, "37d090c5e92e35eae3ec20dee4a6ad6b2d305fa90e4aaf98ef44205c6bb383adc6b5fb91ef9a8fb8a6693ed49591210f1eff265befc5aa114b238a1a0842df72"}}}, {{@uncond, 0x0, 0xd0, 0x138, 0x0, {}, [@common=@eui64={{0x28}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x2, 0x4, 0x2145, 0xaefa, 'snmp_trap\x00', 'syz1\x00', {0x8}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) syz_mount_image$exfat(&(0x7f0000000040), &(0x7f0000001b40)='./file0\x00', 0x208008de, &(0x7f0000001b80)=ANY=[@ANYBLOB='utf8,errors=continue,namecase=1,utf8,gid=', @ANYRESHEX=0x0, @ANYBLOB=',umask=00000000000000000000077,umask=00000000000000000005676,uid=', @ANYRESHEX=0x0, @ANYRES16, @ANYRESHEX=0x0, @ANYBLOB="2c000ca8768ddddc191573cbd33da79641936c9de64e264f331d1b50f4c4f54702f51dcbddb39c14c19175f07a639bb65ea608fbf6fadf5d8da30ace1281bed3e61b084526e10dbe921dad84fbcabc5791f52445cb76b789ed377aa0cd17309c4df04d525e8af05fb246b33836d90656cd2daa991b916be40df3bd607ae5672e1bb90730d0ff03000000000000c5f0cf287ea707c1fc66165f74e7d8a78c37a4b86907cec1df06da3611f616718d88770a2520ceb039bc06ef4d1183"], 0x1, 0x1506, &(0x7f0000001d00)="$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") ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'macsec0\x00', @random="010000201000"}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_create1(0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000021000f0000f901000000000002"], 0x1c}}, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x12) 10.544350813s ago: executing program 1 (id=14332): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, 0x0, 0x0) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x1, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r3}, 0x10) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r6, 0x5412, 0x0) ioctl$TIOCSTI(r6, 0x5412, &(0x7f0000000040)=0x9) ioctl$TIOCSTI(r6, 0x5412, &(0x7f0000000000)=0x7f) syz_open_procfs(0x0, 0x0) 9.58021418s ago: executing program 1 (id=14347): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r1}, 0x10) setitimer(0x0, 0x0, 0x0) 9.524355951s ago: executing program 1 (id=14351): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000180), 0xfc, 0x564, &(0x7f00000008c0)="$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") r0 = open(&(0x7f00000000c0)='./file1\x00', 0x181042, 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaa7ed01cbbaaaaaaaaaa86dd600101000008110000000000000000006a8c83f9c553e5529c0009000000000000fe800b007cb8bf0c58daa00f"], 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r1 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r4}, 0x18) setsockopt$inet_buf(r0, 0x0, 0x11, &(0x7f0000000580)="6705029ef80180f654d99910536f97e157b50b315fc5ff4346be336f2d22ef3fa7ef80ea80c38fd90c6e916835c86eeb3c43459129254a5c1e16629e4feabe698c97e4abedccfdb9a629b7ed7319f181f285d28721faa3ea2073febb1f9c87871238ef5ffb626b4303c9ce9e4956b6a27d273ffe9408ae2cf06f345f11c1e994baeee27a3003a9bd9098982f292f1f9d3e0181f8c6e32f2dda503d5acd17f0b1e7aac26f53d4203e86fed6337da9aaf202ea4ed95e2be9a4a9f0cd850cc279dcd9687fa1814f", 0xc6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) sendfile(r0, r0, &(0x7f0000000240), 0x7f03) 7.985606212s ago: executing program 7 (id=14366): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x62140, 0x102) fcntl$setlease(r0, 0x400, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x169a82, 0x109) sendfile(r1, r1, 0x0, 0xb) timer_create(0x0, 0x0, 0x0) epoll_create1(0x80000) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000020000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) sched_setaffinity(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newsa={0x158, 0x10, 0x713, 0x70bd28, 0x0, {{@in=@local, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x2, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x84, 0x0, 0xffffffffffffffff}, {@in6=@mcast1, 0x0, 0x32}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', {0x0, 0x0, 0x8, 0x100000001, 0x6}, {0x0, 0x0, 0x2, 0xfffffffffffffffc}, {0xc}, 0x70bd28, 0x0, 0x2}, [@algo_aead={0x68, 0x12, {{'rfc4543(gcm(aes))\x00'}, 0xe0, 0x80, "316f74eeac053deb73fc018493cc121927a9bca207141b9a451c00aa"}}]}, 0x158}, 0x1, 0x0, 0x0, 0xc0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x2) ioctl$BLKIOMIN(r0, 0x1278, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000340)={'wg0\x00', 0x0}) r5 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000003c0)='bpf_lsm_mmap_file\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0x12, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@cb_func={0x18, 0x4, 0x4, 0x0, 0x2}, @generic={0xa, 0x0, 0x0, 0x8, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000300)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x8, '\x00', r4, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x0, 0x7, 0x80, 0x3}, 0x10, r5, 0x0, 0x2, &(0x7f0000000400)=[r6, r0, r0, r0, r0, 0xffffffffffffffff], &(0x7f0000000440)=[{0x1, 0x4, 0x7, 0xa}, {0x4, 0x2, 0x1, 0x9}], 0x10, 0x0, @void, @value}, 0x94) 7.958207992s ago: executing program 7 (id=14369): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000100)={[{@discard}]}, 0x1, 0x787, &(0x7f0000001000)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x2) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e00)={{r2}, &(0x7f0000000d80), &(0x7f0000000dc0)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x24, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='qrtr_ns_service_announce_del\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) syz_usb_connect$uac1(0x1, 0x8a, &(0x7f0000000f80)=ANY=[@ANYBLOB="12010003000000086b1d01014000010203010902"], &(0x7f0000011700)={0x0, 0x0, 0x24, &(0x7f0000011280)=ANY=[@ANYBLOB="050f2400030b10010c000004000300540a1003003a00fd0900800a10"], 0x1, [{0x0, 0x0}]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000340)='ext4_sync_fs\x00', r6}, 0x10) sync() 7.903756082s ago: executing program 1 (id=14371): sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file2\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0xffffffffffffff2b, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x9) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000180)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './bus'}}, {@uuid_off}]}) r3 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mknodat$loop(r3, &(0x7f0000000000)='./file1\x00', 0xc000, 0x0) 4.529180877s ago: executing program 0 (id=14374): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40000000, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000980)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r1}, 0x18) listen(r2, 0x3) 4.509398257s ago: executing program 7 (id=14375): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000005000000060000000700000015"], 0x24) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000010000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x10000008}}}, 0x88) 4.460910637s ago: executing program 7 (id=14376): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40000000, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="a800000000010904000500000000000002000000240001801400018008000100e000000108000200ac1e01010c00028005000100000009002400028014000180080001000000010908000200ac1e00010c000280050001000000000044000f800800014000000006080003400000002b080003400000000808000240000000400800014000000000fb0001400000000708000140000044f10800034000000003080007"], 0xa8}}, 0x0) 4.405835328s ago: executing program 0 (id=14377): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8}]}, 0x44}}, 0x0) 4.397489258s ago: executing program 1 (id=14378): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a94, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 4.342556768s ago: executing program 0 (id=14380): socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000000c0)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000780)={@broadcast, @random="6487a2bed3d6", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x300, 0x0, 0x0, 0x6c, 0x0, @private}, {{}, {}, {}, {0x8, 0x88be, 0x0, {{0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1}}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5}}}}}}}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000280)={[{@nogrpid}, {@jqfmt_vfsv0}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@debug}, {@nombcache}, {@quota}, {@nolazytime}]}, 0x3, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0x8004587d, &(0x7f0000000080)={@id={0x2, 0x0, @c}}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008012, &(0x7f0000001e80), 0x1, 0x555, &(0x7f00000024c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0xf) 4.324223918s ago: executing program 4 (id=14381): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) mount$9p_fd(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 4.323699628s ago: executing program 1 (id=14382): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000180), 0xfc, 0x564, &(0x7f00000008c0)="$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") r0 = open(&(0x7f00000000c0)='./file1\x00', 0x181042, 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaa7ed01cbbaaaaaaaaaa86dd600101000008110000000000000000006a8c83f9c553e5529c0009000000000000fe800b007cb8bf0c58daa00f"], 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r1 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r4}, 0x18) setsockopt$inet_buf(r0, 0x0, 0x11, &(0x7f0000000580)="6705029ef80180f654d99910536f97e157b50b315fc5ff4346be336f2d22ef3fa7ef80ea80c38fd90c6e916835c86eeb3c43459129254a5c1e16629e4feabe698c97e4abedccfdb9a629b7ed7319f181f285d28721faa3ea2073febb1f9c87871238ef5ffb626b4303c9ce9e4956b6a27d273ffe9408ae2cf06f345f11c1e994baeee27a3003a9bd9098982f292f1f9d3e0181f8c6e32f2dda503d5acd17f0b1e7aac26f53d4203e86fed6337da9aaf202ea4ed95e2be9a4a9f0cd850cc279dcd9687fa1814f", 0xc6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) sendfile(r0, r0, &(0x7f0000000240), 0x7f03) 4.310125868s ago: executing program 7 (id=14383): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) mknodat(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rt_cache\x00') lseek(r5, 0x80, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x33}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r6}, &(0x7f0000001c00), &(0x7f0000001c40)=r7}, 0x20) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) write$UHID_INPUT(r0, &(0x7f0000001980)={0x9, {"a2e3ad214fc752f91b5b09094bf70e0dd038e7ff7fc6e5539b324c078b089b3438076d1a0890e0878f0e1ac6e7049b076d959b669a240d5b67f3988f7ef319520100ffe8d178708c523c921b1b5b32310d076d0936cd3b78130daa61d8e809ea889b5802b77f07227227b7ba67e0e78669a6f5c2a874e62a9ccdc0d31a0c9f318c0da1993bd160e233df4a62179c6f30e065cd5b91cd0ae19397d696d0d758f2dc7d1c00305d3f46635eb016d5b1dda98e2d749be7bd1df1fb3b231fdcdb5075a9aaa1b469c3090000000002335875271b286329d169934288fd789aa37d6e98b224fd44b65b31334ffc55cc82cd3ac32ecdb08ced6f9081b4dd0d8b38f3cd4498bee800490841bdb114f6b76383709d8f5c55432a909fda039aec54a1236e80f6a8abadea7662496bddbb42be6bfb2f17959d1fe90a56c71b1931870262f5e801119242ca026bfc821e7e01000000138e645bb80c617601000000be70de98ec76a9e40dad47f36fd9f7d0d42a4b5f1185ccdcf16ff46295d8a0fa17713c5802630933a9a34af674f3f39fe23491237c08822dec110911e893d0a8c4f677747abc360934b82910ff85bfd995083bba2987a67399eac427d145d595a40b9f6ff14ac488ec130fb3850a27af9544ae15a7e454dea05918b41243513f000000000000000a3621c56cea8d20fa911a0c41db6ebe8cac64f17679141d54b34bbc9980000000b3309603f1d4ab966203861b5b15a841f2b575a8bd0d78248ebe4d9a80002695104f674c2431dca141fae269cab70e9a66f3c3a9a63e9639e1f59c0ede26c6b5d74b078a5e15c31634e5ae098ce9ee70771aaa18119a867e1088334975e9f73483b6c82fa678ca14ffd9f9db2a7869d85864056526f889af43a6056080572286522449df466c632b3570243f989cce3803f465e41e610c2021d653a5520000008213b704a5000000000000008ef9f190bae97909507041d860420c5664b27921b14dc1db8892fd32d0ad7bc94681359bad8deff4b05f60cea0da7710a80000000000008000bea37ce0d0d4aa202f928f28381aab144a5d429a04a6a2b83c7068ae949ed06e288e810bac9c76600025e19c907f8ea2e2010000008271a1f5f8528f227e79c1389dbdfffe492f21579d2c15b8c70cdb1c332d86d87341432750861ec2bc3451edca194b221cfec4603d276bbaa1dfa6d4e38a48a76eafc9a9a0270e4c10d64cd5a62427264f2377fe763c43470833ac96c45f357cbbaba8f1b1fdcc7cbb61a7cdb9744ed7f9129aede2be21ccfdc4e9134f8684b3a4f354da9a795e96334e207dff70f1988037b2ed3aaf575c0b88d8f146684078416d59fdee5325928974d12d3099dac44c3f0008047096a44002bebc2420aed92fa9b6578b4779415d97b9a6d6d5495c118045651cf41c2fc48b778efa5ea5677747430af4162b987b80c3e001cd34e5c92f76cc4c24eeb8bc4e9ac2bed9e53803edf1a4ae3a9737d214060005ea6f1783e287b3bee96e3a726eafe2fdfaa78d1f48c13b64df07847754b8400daaa69bf5c8f4ceb360c7e658828563e2d25c4aa348561f927e88f6dc7bcbf2a5e69b3df3495903f06572e1e007fa55a2999f596d067312f5779e8dbfdcf3427138f3d444d2639a10477f9bec4b4bbb6e3c04be68981f392203dd0ee3ef478e16dacfc5e3e03cf7ab8e3902f1b0ff034e00000000ca509301815b1b6fc6522d4e4fdc11a48cf42d48604675fde2b94cf00500a2690891abf8ab9c015073014d9e08d4338b8780bdecd436cf0541359bafffa45237f104b96210403b2de9efed496f42355bc7872c827466cfa5c478b095b68441a34cb51682a8ae4d24ad92f243941ed274549b79a7962fb385a882e8020f06c4c2ba1dd5cac7c18876da865d258734dd73583df292892448039ef799cf0630becdbe6c4579b5561dc825ab829827945e020c1f67ee615feb6243378e0610060f02cca4e91b2f001edb3d78fb4b55668dda93ae62fccfcbb2b75a2183c46eb65ca8124e1b4da7fbb77ab2fc043aead87c32ab875ee7c2e7b7019c982cd3b43e4fb1a5fb135c0c7dcee8fe6516a328032f88c042891824659e9e01feffffffffffff83a2b210520106b8a358b50ab7a1fa89af9c251fe5294b3d1802d5676d951061ec97b1ad94872cb2044642c37b4a6cc6c04effc1672db7e4b68d787d9a7a508ae54b3cd7369d75f2e8c77d95a3d361c040babb171607caac2a3559ad4f75465f49c0d0ae3716db6e00cb11db4a5fade2a57c10238e204a67737c3b42aa01b20f7694a00f16e2d0174035a2c22656dc00880acebdbe8ddbd75c2f998d8ac2dfad2ba3a50200000045a45957f24d758ed024b3849c11d412a2a03b4047497022d9c30e23ef4df5c89644f48bb536f7945b59d7bcddff754413d135273ea8e75f22f216c6b9990ae71806f2c00b4025c48b75c0f73cdb9a7b8fa367b50028067e7f16f4dd569d462f4f19eacdb3ed70eeebb4483f8fd777d443e8b40426db6fe2907ac0ca3d2414442e8f3a154704b0e51bc664a137b26be719f4f7c9a5678a674dfc95df80b9ce375dd649c8c704e509bd88c8e63d8c7dd67071115c8982ba46af4d6adcc9f68a75b9397b035153faf463661c953fcad6f37525c1a0e94610dd94323f6c15d085197149bfd6655548cfd9c52c9711937f79abb1a124f1210465483cd3b2d78378cfb85ed82e7da0f6eb6d279f2ae455925d0f6f1ba571eba281f2a654fb39ddff3b484439ff158e7cd419e037f3e3ad038f2211f1033095563c7f93cd54b9094f226e783271e1e5a2a2c10712eab625d64931cd4ffe6738d97b9b5ef828ee9fb059fc01af0e79c1e14b1d25988c69a399567c1d93768f7971d31488b8658a20878b7c1dd7ba02fc42939dde3d4a3339a65d507dc59c51097b40517705da56e9ebf0afa53282bf86dbb58c548069ff6eb95aade7cc66d7bbef724779ca1f731b3346ff177050373d79ff7b3e7f9bc0c1b4b266a8878b90baaa039d3e3b63979ac3df6e6f4859afd50238c7547a39b60810938044ae185d2ba3e00a4e73676864ae090d81eaeecf1d0ab378dd4dd891e937c2ea5410e0513005000000000000003911fab964c271550027697b52160687461602f88df165d884b36ec2b6c25a2f33c715687e9d4afb96d6861aca47da73d6f3dd014e5c5ad8fe995754bd9cf32fce1e31919c4b2082fb0a30b9deae84bed4b28045634073c9c58c89d9e99c81769177c6ea94f88a4facfd4c735a20307c737afae5136651b1b9bd522dcb399473296b831dbd933d93994ba3064279b10ea0c5833f41f157ea2302993dbe433b1aa3a37684f4113c48859465c3b415c3432f81db87195358bfee2916580dacae008e595f437491d87abed02cefcd9db53d94d02dae17b118e5d6787463183b4b87c105000000302a808d7f5251440613d17ca51055f2f416a44fe180d2d50c312cca7cb14a20dc331f57a9817139a206fc76957227ffff2de20a4b8e3737fbb40100000006376f799eba367e21f94ca598705f5dcb767d6f0900d6b0f6095e53c4c4234d0c1fbe434f6ab83c0013ee93b83946ee7759e89d7bdd1a32d7b311711b757fe43c06d21a35810d8fe98b27faea8aa12bc8716eefc5c97c45ac33eeec964c5214bc3a9359bdea1cccab94f15e36319cb34ebcacedb82c2ed3de5a8a8f0011e8f74e82d7ceec7dc808bf653639d7961939adfdeeeaff19d11efcafb6d546fef271e89d6cc2389e81ff58cefcce3fbf4625a7e7de40e42e07b34449e15e065cc7348663a52190202c7af288a4510de03dab19d26285eda89156d50dd385a602000000000000007007ad1519ad5470de3dd6d6080cafccf8a97406bb6b68a1f0c4549820a73c880f475f732ae00303000000000000007fb33b72685ec37a2d3f766413a60459516246e5a1d998a2017aef0948a68cf255315ab80dd349e891aef595dc4d470e8ac32a308e15fc37d06aeac289c0523f483e1ff7408c6087f1ab652f2ef91d4f2b01987b0f46da034e5c3f745a7ee8101a3934c54e24b48ec0275e2df086dc746b0827cbf6529006c6b95f2722e58c05f752ce2126596e1cd7655b904801784c416b22f73d324678e2724f43f1fe687c7e8a60c28b82b6522fb5f6ffcdd56fed88935fcb75912d5ecd36dea3bca0b7427d8392c6289455e8f8d2ab2242729251ae233a9e02210e62df0546a74b333a1c48f95fd54acb5741259e8c5488efeee327415cc19451432c6f14c27693102a5bd84857cd6586fc5ca9a93eb0145fac0662ff86107f998a8ef7df8aa14046c55b03d3d47f88a8d60f7774a2ee08008897fb411a94b3c2fc5d5f0db42c0456ec015f08e5247d33ae2d35603ff8454c16f8342856935125102bb6ce431b63ee356b0c785f2f47b90e29389f22fc5b59a70efaea2bd40195af4486220d702e30bfc43c10ec23ea6283994a7dde4dcb61fea6b651fb1d62458d0741a12830052fcc460db043afe525629b40d7cee458e4cb5e930ed624806c43a006e39336d07c2b80c1c128ad2706f48261f7897484c297a1a6613bc18f5a38d442768af38041efe03d152ef95ff569e76db2391f4509d7f339d92fdb4a89364949da398000000000000000d80a4fe654578376e599aff3565b1d531f30912b9945030b81ea9935fd46edb44a78f615255490a4b621501f2a9e4d24624c4dac9274118c67584f5d374755534d7f68f679c4ff516a9c861a0e7e65868fcb2bf1cb9aea4e05df72279fdb0d2b9e935c5af3cf474bed79dfc248c1f5aea4b8b32c5d295e57fa9c0fe662a46b7f71cd47744db86c50b704c98ad90295c7b2c7439a2d78ccfa79b5fc2bff6bbf840262bf89394b3e0691953264d2700c838fa2c7b3425260f59554e502dcea39cb313b0000000000004ca7c12f45858d6284ca6270d6b2f0e58fded8a7b4a302a97bc641df07720ba2b26bbfcc807ca0abb1b44322269c21c5ec68cb068ea88067d905ea917bb03eefdaebdeabf2d0dce80997c915c8949de992587c2cb5fe36ffffffff00000000b77940b5f07722e47a08d3679507000000000000934b99b3109af65d77e86abd6859cddf4bbae1f0930462df15fddbc48562ea3511a8065ef028cf12f14dcf6ebecd8d884836174faf1aa609e5f1ee1062dfa13bdc1fa7cfaadba85c72e9758f03a755d0be53f8d2a1df0d07b3d5bd3b01faffd0addbed2881a9700af561ac8c7e36bb2fc4c40e9c766c06817b97c9ede7885d94ffb0759be0daf60af93109eb1dee72e4363f51af62af6fb2a6df3bec89822a7a0b678058fa3fef86faec216eb6992162f8dcbf719c1484d2f9c55f4901203a9a8a2c3e90f39c3dbc10360a1a49700d1dfbf66d69f6fbaf506c8bcce8bb0d872a02238926407a4eddd5d00000f4ff000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600", 0x1061}}, 0x1006) syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000b00)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x40, 0x4f3, 0x755, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0x80, 0x5, [{{0x9, 0x4, 0x0, 0x5, 0x2, 0x3, 0x1, 0x2, 0xf, {0x9, 0x21, 0x5, 0x4, 0x1, {0x22, 0x1e}}, {{{0x9, 0x5, 0x81, 0x3, 0x3ff, 0x6, 0x7f, 0x5}}}}}]}}]}}, 0x0) 4.201012659s ago: executing program 9 (id=14386): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x62140, 0x102) fcntl$setlease(r0, 0x400, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x169a82, 0x109) sendfile(r1, r1, 0x0, 0xb) timer_create(0x0, 0x0, 0x0) epoll_create1(0x80000) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000020000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) sched_setaffinity(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newsa={0x158, 0x10, 0x713, 0x70bd28, 0x0, {{@in=@local, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x2, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x84, 0x0, 0xffffffffffffffff}, {@in6=@mcast1, 0x0, 0x32}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', {0x0, 0x0, 0x8, 0x100000001, 0x6}, {0x0, 0x0, 0x2, 0xfffffffffffffffc}, {0xc}, 0x70bd28, 0x0, 0x2}, [@algo_aead={0x68, 0x12, {{'rfc4543(gcm(aes))\x00'}, 0xe0, 0x80, "316f74eeac053deb73fc018493cc121927a9bca207141b9a451c00aa"}}]}, 0x158}, 0x1, 0x0, 0x0, 0xc0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x2) ioctl$BLKIOMIN(r0, 0x1278, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000340)={'wg0\x00', 0x0}) r5 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000003c0)='bpf_lsm_mmap_file\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0x12, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@cb_func={0x18, 0x4, 0x4, 0x0, 0x2}, @generic={0xa, 0x0, 0x0, 0x8, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000300)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x8, '\x00', r4, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x0, 0x7, 0x80, 0x3}, 0x10, r5, 0x0, 0x2, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r0, r0, 0xffffffffffffffff], &(0x7f0000000440)=[{0x1, 0x4, 0x7, 0xa}, {0x4, 0x2, 0x1, 0x9}], 0x10, 0x0, @void, @value}, 0x94) 4.170591459s ago: executing program 4 (id=14387): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000280)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000004c0)='kfree\x00', r2}, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x200040b4}, 0x0) 3.932152831s ago: executing program 4 (id=14388): write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x15) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002e80)={{}, 0x0, 0x0}, 0x20) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f00000700000000000000", @ANYRES32, @ANYRES32, @ANYBLOB='\x00'/13], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) pipe(0x0) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, 0x0) write$FUSE_INIT(r7, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8fb}}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x400, 0x2, 0x1, 0x2048, r6, 0xffffffff, '\x00', 0x0, r6, 0x5, 0x2, 0x4, 0x5, @void, @value, @void, @value}, 0x50) 2.797693889s ago: executing program 9 (id=14389): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_lookup=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2) 2.764884969s ago: executing program 9 (id=14390): syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=@base={0xb, 0x5, 0x7, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r2}, 0x10) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) 2.384900862s ago: executing program 0 (id=14391): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r1}, 0x10) setitimer(0x0, 0x0, 0x0) 2.384409892s ago: executing program 4 (id=14392): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8}]}, 0x44}}, 0x0) 2.358350522s ago: executing program 9 (id=14393): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a94, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 2.343874093s ago: executing program 4 (id=14394): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="18001000000007e62108120361920000616505e945919046ed970b796d7bfb00000d9500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f00000008c0)='GPL\x00', 0x9, 0x0, 0x0, 0x1e00, 0x19, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000940)='kmem_cache_free\x00', r0, 0x0, 0x10}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r4}, 0x18) r5 = epoll_create1(0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000800), 0x101007, 0x0) preadv(r6, 0x0, 0x0, 0x81, 0x8000) epoll_wait(r5, &(0x7f0000001e40)=[{}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto, @const={0x0, 0x0, 0x0, 0xa, 0x2}]}}, &(0x7f0000000100)=""/223, 0x32, 0xdf, 0x1, 0x0, 0x0, @void, @value}, 0x28) read$FUSE(0xffffffffffffffff, &(0x7f0000002080)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setfsuid(r7) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x800714, &(0x7f0000000000)={[{@nobarrier}]}, 0xff, 0x485, &(0x7f0000001040)="$eJzs3M9rHFUcAPDvTJL+bhNrrba2Gq1i8UfSpFV78KCi4EFB0EM9xiSttdtGmgi2BI0i9SgF7+JR8C/w5kXUgwheFTxKoWgQmnqKzK9mu9mkSZpkbfbzgc2+t/Nm3/vOzNt9My+zAbSt3uxPErEjIn6LiO4ie3OB3uJpZnpy+Pr05HASs7Nv/JXk5a5NTw5XRav1tpeZw2lE+mkSzyfz6x2/cPHMUK02er7M90+cfa9//MLFp06fHTo1emr03ODx48eODjz7zODTqxJnFte1/R+OHdj3yluXXxs+cfntH7/JmrX3YLG8Po5but4koCZ6s63292yucdmjy2j7nWBnXTrpbGFDWJaOiMh2V1fe/7ujI+Z2Xne8/ElLGwesqey7afPCi6dmgQ0siVa3AGiN6os+O/+tHus09PhfuPpCxKYyPTM9OTxzI/7OSMvXu9aw/t6IODH175fZI5Z7HQIAYAXysc2TzcZ/aezNn4u5jl3lHEpPRNwVEbsj4u6I2BMR90TkZe+NiPuKlWe7l1h/b0N+/vgnvdK0zaskG/89Vzf2m6mLv3zq6ShzO/P4u5KTp2ujR8ptcji6Nmf5gUXq+O6lXz9faFn9+C97ZPVXY8GyAVc6Gy7QjQxNDK3WRrj6ccT+zmbxJzdmArIjYF9E7F/eW++qEqcf//rAQoVuHf8iVmGeafariMeK/T8VDfFXksXnJ/u3RG30SH91VMz30y+XXl+o/tuKfxVk+3/bzcd/Q4nuf5JivrYrarXR8+PLr+PS758teE6z0uN/U/JmPmf98zvFax8MTUycH4jYlLya56tzuvz1wbl1q3xVPov/8KHm/X93uU4W//0RkR3EByPigYh4sGz7QxHxcEQcWiT+H1585N1F4k8iiZbu/5Gmn383jv+epH6+fgWJjjPff7vQjPnS9v+xmMo/awv5598tLLWBt7n5AAAA4I6QRsSOSNK+It27I9K0r6/4H/49sS2tjY1PPHFy7P1zI8U9Aj3RlVZXurrrrocOJFPlOxb5wfJacbX8aHnd+IuOrXm+b3isNtLi2KHdbb+5/0fV/zN/drS6dcCac78WtK/G/p+2qB3A+lvK979zAdiYmvT/ra1oB7D+nP9D+2rW/z9qyBv/w8Y0v///0eQn64CNyPgf2pf+D+1L/4e2dDv39a88Ud0ssPL32bLkO/zbJVH94sVa1rU15l6JtOUht1Ei6zHrW+ncb6gAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADcyf4LAAD///ss5ts=") mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x10) syz_mount_image$fuse(0x0, &(0x7f0000001040)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file2'}}, {@nfs_export_on}], [], 0x2c}) clock_gettime(0x0, &(0x7f0000000780)) 2.325067262s ago: executing program 0 (id=14395): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000d00)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) recvmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}], 0x1}, 0x0) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000900)='>', 0x1}], 0x1}, 0x800) 2.324556372s ago: executing program 9 (id=14396): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002900000018010000202070250000000000202020631af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.255928273s ago: executing program 9 (id=14397): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x2238000, &(0x7f0000001f40)={[{@errors_remount}], [{@pcr={'pcr', 0x3d, 0x9}}, {@subj_user={'subj_user', 0x3d, 'sched_switch\x00'}}]}, 0x3, 0x50a, &(0x7f0000000a00)="$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") sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x300}, 0x8) fsetxattr$security_selinux(r3, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1e, 0x0) ioctl$BINDER_FREEZE(r3, 0x400c620e, &(0x7f0000000040)={r0, 0x1, 0x1}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r6}, 0x18) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000400)={0x1, 0x1, 0x1000, 0x5a, &(0x7f0000000300)="c83e1f155bf9cc5700f9e33e1247f5dc4cdcec0ade6db79b77a271ac0f19342de5e39f0d1d316b30f3633b9fc124e94eb5191bee16526b845efa72b896e0380a977c3de6bc869c127587713348699cc315107162b27c49a8a903", 0x1, 0x0, &(0x7f0000000280)='G'}) r7 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r9, 0x20000}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x3, {0x4871, 0x4}}]}]}, @IFLA_MTU={0x8}]}, 0x3c}}, 0x0) socket$vsock_stream(0x28, 0x1, 0x28) socket$inet(0x2, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10, &(0x7f00000000c0)={[{@nogrpid}, {@dioread_lock}, {@journal_dev={'journal_dev', 0x3d, 0x200}}]}, 0xfe, 0x452, &(0x7f0000000800)="$eJzs3MtvG0UYAPBvnTh9URJKefQFgYKoeCRN+qAHLkUgcQAJCQ5FnEyaVqVug5og0aqCwiEcUSXuiCMSfwEXygUBJySucEdIEcqFwslo7d3UOLYTJ05c4t9PWnXGO+7Mt7sTj2d2HUDfGo2IAxFxT0T8GhHDEZE0Fhit/XN78frU34vXp5KoVN74M6mW+2vx+lReNH/frlqmMtCm3vm3I0rl8vSVLD8+d+m98dmr1567cKl0fvr89OXJU6eOHzs0dHLyRFfi3J22df+HMwf3vfLWzdemztx858evkyzuaIijW0arR625J7tdWY/trksngz1sCB1J+2h6uorV/j8cA7Fjad9wvPxJTxsHbKhKpVDZ1nr3jQqwhaWjeaAf5R/06ffffNukocddYeF0LM1j3M622p7BKGRlihtY/2hEnLnxzxfpFhs0DwEAUO/W6Yh4ttn4rxAP1pW7N1sbGomI+yJiT0TcHxF7I+KBiGrZhyLi4Q7rb1whWT7+qQyvKbBVSsd/L2RrW/8d/+WjvxgZyHK7q/EXk3MXytNHs2NyJIrb0vxEmzq+e+mXz1rtqx//pVtafz4WzNrxx2DDBN3ZUrG0npjrLXxcWwBYHn8S+TJOOj7eFxH7O/y/8+8YF57+6mCrMivH30YX1pkqX0Y8VTv/N6Ih/lzScn1y4vmTkyfGt0d5+uh4flUs99PP86+3qn9d8XfBwq1K7Gx6/S/FP5Jsj5i9eu1idb12tvM65n/7tOV3mrVd/3OloeTNanooe+2D0tzclYmIoeTV5a9P3nlvns/Lp9f/kcPN+/+euHMkDkREehEfiohHIuLRrO2PRcTjEXG4Tfw/vPjEu53H32ZWvovS+M+udP6j/vx3nhi4+P03ncefS8//8WrqSPZKev5Ximu1DVzPsQMAAID/i0L1HvikMLaULhTGxmr38O+NnYXyzOzcM+dm3r98tnav/EgUC/lM13DdfOhENjec5ycb8seyeePPB3ZU82NTM+VO5xOB7trVov+nfm/3AA+wNXheC/qX/g/9S/+H/qX/Q//S/6F/Nev/H/WgHcDmW+Hzf8dmtQPYfMb/0L/0f+hf+j/0pZbPxhfW9ci/RI8S3w6t77caVp+Iwl0S8pZJFKPprsFV/5jFGhJJRGxruqvXf5kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC6498AAAD//9di55E=") 2.157207864s ago: executing program 0 (id=14398): syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c84, &(0x7f0000000340), 0x1, 0x775, &(0x7f0000001180)="$eJzs3c9rXNUeAPDvnSRNm/a95MGD9+oqIGigdGJqbBVcVFyIYKGga9thMg01k0zJTEoTAlpEcCOouBB007U/6s6tP7b6X7gQS9W0WHEhkTu5t502M2mSJpnqfD5wM+fceyfnfOf+OGfmHu4NoGeNpn8KEYcj4t0kYjibn0TEQDPVH3Fybb1bK8vldEpidfXlX5LmOjdXlsvR8p7UwSzz/4j45q2II4X15dYXl2ZK1WplPsuPN2YvjNcXl46eny1NV6Yrc8cnJiePnXjqxPGdi/W375cOXXvvhcc/P/nHm/+7+s63SZyMQ9my1jh2ymiMZp/JQPoR3uX5nS6sy5JuV4BtSQ/NvrWjPA7HcPQ1UwDAP9nrEbEKAPSYRPsPAD0m/x3g5spyOZ+6+4vE3rr+XETsX4s/v765tqQ/u2a3v3kddOhmcteVkSQiRnag/NGI+PjLVz9Np9il65AA7bxxOSLOjoyuP/8n68YsbNUTGyzbl72O3jPf+Q/2zldp/+fpdv2/wu3+T7Tp/wy2OXa3477H/4EdKGQDaf/v2Zaxbbda4s+M9GW5fzX7fAPJufPVSnpu+3dEjMXAYJqf2KCMsRt/3ui0rLX/9+v7r32Slp++3lmj8FP/4N3vmSo1Sg8Sc6vrlyMe6W8Xf3J7+ycd+r+nN1nGi8+8/VGnZWn8abz5tD7+yEYn7Y7VKxGPtd3+d0a0JRuOTxxv7g7j+U7Rxhc/fDjUqfzW7Z9Oafn5d4G9kG7/oY3jH0lax2vWt17Gd1eGv+607P7xt9//9yWvNNN5P+JSqdGYn4jYl7y0fv6xO+/N8/n6afxjj7Y//jfa/9PvhGc3GX//tZ8/2378uyuNf2pL23/riau3Zvo6lb+57T/ZTI1lczZz/ttsBR/kswMAAAAAAAAAAAAAAAAAAAAAAACAzSpExKFICsXb6UKhWFx7hvd/Y6hQrdUbR87VFuamovms7JEYKOS3uhxuuR/qRHY//Dx/7J78kxHxn4j4YPBAkt9HcarLsQMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABA7mCH5/+nfhzsdu0AgF2zv9sVAAD2nPYfAHqP9h8Aeo/2HwB6j/YfAHqP9h8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIBddvrUqXRa/X1luZzmpy4uLszULh6dqtRnirML5WK5Nn+hOF2rTVcrxXJt9n7/r1qrXZiMuYVL441KvTFeX1w6M1tbmGucOT9bmq6cqQzsSVQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAsDX1xaWZUrVamZfYRmL14ahG9xN92e70sNRnTxPJw1GNHU50+cQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8DfxVwAAAP//02Ii/w==") open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000300)={@multicast, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x65, 0x0, 0x0, 0x33, 0x0, @private, @broadcast}, {0x4e20, 0x0, 0x8}}}}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0x1) sendfile(0xffffffffffffffff, r1, 0x0, 0x3ffff) lchown(0x0, 0xee00, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x7ffff000) 10.6708ms ago: executing program 7 (id=14399): syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c84, &(0x7f0000000340), 0x1, 0x775, &(0x7f0000001180)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) r3 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TCSETSW2(r3, 0x402c542c, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180500000000c800000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000fc0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001a40)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'veth1_to_team\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0x10}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x14, 0x2, [@TCA_FQ_CODEL_TARGET={0x8, 0x1, 0x7b}, @TCA_FQ_CODEL_CE_THRESHOLD={0x8, 0x7, 0x2c}]}}]}, 0x48}}, 0x0) 0s ago: executing program 4 (id=14400): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x62140, 0x102) fcntl$setlease(r0, 0x400, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x169a82, 0x109) sendfile(r1, r1, 0x0, 0xb) timer_create(0x0, 0x0, 0x0) epoll_create1(0x80000) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000020000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) sched_setaffinity(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newsa={0x158, 0x10, 0x713, 0x70bd28, 0x0, {{@in=@local, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x2, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x84, 0x0, 0xffffffffffffffff}, {@in6=@mcast1, 0x0, 0x32}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', {0x0, 0x0, 0x8, 0x100000001, 0x6}, {0x0, 0x0, 0x2, 0xfffffffffffffffc}, {0xc}, 0x70bd28, 0x0, 0x2}, [@algo_aead={0x68, 0x12, {{'rfc4543(gcm(aes))\x00'}, 0xe0, 0x80, "316f74eeac053deb73fc018493cc121927a9bca207141b9a451c00aa"}}]}, 0x158}, 0x1, 0x0, 0x0, 0xc0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x2) ioctl$BLKIOMIN(r0, 0x1278, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000340)={'wg0\x00', 0x0}) r5 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000003c0)='bpf_lsm_mmap_file\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0x12, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@cb_func={0x18, 0x4, 0x4, 0x0, 0x2}, @generic={0xa, 0x0, 0x0, 0x8, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000300)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x8, '\x00', r4, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x0, 0x7, 0x80, 0x3}, 0x10, r5, 0x0, 0x2, &(0x7f0000000400)=[0xffffffffffffffff, r0, r0, r0, r0, 0xffffffffffffffff], &(0x7f0000000440)=[{0x1, 0x4, 0x7, 0xa}, {0x4, 0x2, 0x1, 0x9}], 0x10, 0x0, @void, @value}, 0x94) kernel console output (not intermixed with test programs): g a program with bpf_probe_write_user helper that may corrupt user memory! [ 2878.556875][T10029] syz.9.12681[10029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2879.111913][T31906] EXT4-fs (loop9): unmounting filesystem. [ 2879.693234][T10041] netlink: 256 bytes leftover after parsing attributes in process `syz.9.12691'. [ 2880.329970][T10044] netlink: 20 bytes leftover after parsing attributes in process `syz.7.12692'. [ 2880.340708][T10044] device vlan2 entered promiscuous mode [ 2880.396319][T10050] loop9: detected capacity change from 0 to 512 [ 2880.428835][T10050] EXT4-fs: Ignoring removed orlov option [ 2880.488591][ T7736] Bluetooth: hci0: command 0x1003 tx timeout [ 2880.494792][ T1011] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 2880.501988][T10050] EXT4-fs error (device loop9): ext4_orphan_get:1400: inode #15: comm syz.9.12695: casefold flag without casefold feature [ 2880.525904][ T28] audit: type=1326 audit(1742032095.307:6661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10056 comm="syz.4.12698" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 2880.527589][T10057] syz.4.12698 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 2880.549688][ T28] audit: type=1326 audit(1742032095.317:6662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10056 comm="syz.4.12698" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 2880.608900][T10050] EXT4-fs error (device loop9): ext4_orphan_get:1405: comm syz.9.12695: couldn't read orphan inode 15 (err -117) [ 2880.844765][ T28] audit: type=1326 audit(1742032095.317:6663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10056 comm="syz.4.12698" exe="/root/syz-executor" sig=0 arch=c000003e syscall=38 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 2880.878807][T10050] EXT4-fs (loop9): mounted filesystem without journal. Quota mode: writeback. [ 2880.897888][ T28] audit: type=1326 audit(1742032095.357:6664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10056 comm="syz.4.12698" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 2880.957616][ T28] audit: type=1326 audit(1742032095.367:6665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10056 comm="syz.4.12698" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 2881.105520][T10075] overlayfs: missing 'lowerdir' [ 2881.187494][T10073] syz.4.12701[10073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2881.187563][T10073] syz.4.12701[10073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2881.495503][T10081] netlink: 256 bytes leftover after parsing attributes in process `syz.0.12703'. [ 2882.239693][T10091] netlink: 12 bytes leftover after parsing attributes in process `syz.0.12708'. [ 2882.507156][T10091] device vlan2 entered promiscuous mode [ 2882.949475][T31906] EXT4-fs (loop9): unmounting filesystem. [ 2883.583631][T10121] syz.0.12717[10121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2883.585017][T10121] syz.0.12717[10121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2885.168368][T10134] netlink: 256 bytes leftover after parsing attributes in process `syz.1.12719'. [ 2885.522764][T10143] netlink: 12 bytes leftover after parsing attributes in process `syz.9.12727'. [ 2885.534836][T10143] device vlan3 entered promiscuous mode [ 2885.544045][ T28] audit: type=1326 audit(1742032100.337:6666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10125 comm="syz.0.12721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 2885.569227][ T28] audit: type=1326 audit(1742032100.337:6667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10125 comm="syz.0.12721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=102 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 2885.593096][ T28] audit: type=1326 audit(1742032100.337:6668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10125 comm="syz.0.12721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 2885.617418][ T28] audit: type=1326 audit(1742032100.337:6669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10125 comm="syz.0.12721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 2885.667971][T10147] overlayfs: missing 'lowerdir' [ 2886.596113][T10167] syz.4.12732[10167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2886.596536][T10167] syz.4.12732[10167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2886.890567][T10169] loop9: detected capacity change from 0 to 2048 [ 2887.030648][T10169] EXT4-fs (loop9): mounted filesystem without journal. Quota mode: none. [ 2887.179842][T10175] overlayfs: missing 'lowerdir' [ 2888.387681][T10182] netlink: 256 bytes leftover after parsing attributes in process `syz.0.12737'. [ 2888.676629][ T28] audit: type=1400 audit(1742032103.467:6670): avc: denied { create } for pid=10166 comm="syz.9.12735" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=blk_file permissive=1 [ 2889.254656][T10197] netlink: 12 bytes leftover after parsing attributes in process `syz.0.12742'. [ 2889.695263][T10197] device vlan2 entered promiscuous mode [ 2889.879682][T31906] EXT4-fs (loop9): unmounting filesystem. [ 2890.016965][T10209] loop9: detected capacity change from 0 to 512 [ 2890.053108][T10209] EXT4-fs: Ignoring removed orlov option [ 2890.089669][T10209] EXT4-fs error (device loop9): ext4_orphan_get:1400: inode #15: comm syz.9.12746: casefold flag without casefold feature [ 2890.121957][T10209] EXT4-fs error (device loop9): ext4_orphan_get:1405: comm syz.9.12746: couldn't read orphan inode 15 (err -117) [ 2890.164369][T10209] EXT4-fs (loop9): mounted filesystem without journal. Quota mode: writeback. [ 2890.938883][T10219] overlayfs: missing 'lowerdir' [ 2891.084694][T10222] syz.7.12748 (10222) used greatest stack depth: 18936 bytes left [ 2891.109485][T31906] EXT4-fs (loop9): unmounting filesystem. [ 2891.457598][T10229] syz.1.12749[10229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2891.457664][T10229] syz.1.12749[10229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2892.581029][T10250] loop9: detected capacity change from 0 to 512 [ 2892.600349][T10250] EXT4-fs (loop9): orphan cleanup on readonly fs [ 2892.607787][T10250] EXT4-fs (loop9): 1 orphan inode deleted [ 2892.613931][T10250] EXT4-fs (loop9): mounted filesystem without journal. Quota mode: writeback. [ 2892.820460][T10268] overlayfs: missing 'lowerdir' [ 2893.143326][T31906] EXT4-fs (loop9): unmounting filesystem. [ 2893.827343][T10281] loop9: detected capacity change from 0 to 4096 [ 2894.119715][T10295] syz.7.12768[10295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2894.120656][T10295] syz.7.12768[10295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2895.363000][T10281] EXT4-fs (loop9): mounted filesystem without journal. Quota mode: writeback. [ 2895.422678][ T28] audit: type=1400 audit(1742032110.217:6671): avc: denied { lock } for pid=10280 comm="syz.9.12765" path="/562/file1/file1" dev="loop9" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 2895.446306][ T28] audit: type=1400 audit(1742032110.227:6672): avc: denied { getopt } for pid=10280 comm="syz.9.12765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2895.468629][T31906] EXT4-fs (loop9): unmounting filesystem. [ 2897.029199][ T28] audit: type=1326 audit(1742032111.827:6673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10326 comm="syz.4.12780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 2897.168539][ T28] audit: type=1326 audit(1742032111.857:6674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10326 comm="syz.4.12780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 2897.199587][ T28] audit: type=1326 audit(1742032111.857:6675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10326 comm="syz.4.12780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=302 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 2897.290091][ T28] audit: type=1326 audit(1742032111.857:6676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10326 comm="syz.4.12780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 2897.447886][T10340] syz.0.12784[10340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2897.449444][T10340] syz.0.12784[10340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2898.503221][ T28] audit: type=1326 audit(1742032111.857:6677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10326 comm="syz.4.12780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 2898.763939][ T28] audit: type=1326 audit(1742032111.857:6678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10326 comm="syz.4.12780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=144 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 2898.815852][ T28] audit: type=1326 audit(1742032111.857:6679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10326 comm="syz.4.12780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 2898.868475][ T28] audit: type=1326 audit(1742032111.857:6680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10326 comm="syz.4.12780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 2899.958775][T10373] overlayfs: failed to clone upperpath [ 2900.219463][T10379] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 2900.344187][T10383] overlayfs: missing 'lowerdir' [ 2900.808048][ T28] kauditd_printk_skb: 65 callbacks suppressed [ 2900.808080][ T28] audit: type=1326 audit(1742032115.597:6746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10395 comm="syz.9.12802" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2900.868983][ T28] audit: type=1326 audit(1742032115.637:6747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10395 comm="syz.9.12802" exe="/root/syz-executor" sig=0 arch=c000003e syscall=302 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2900.894859][ T28] audit: type=1326 audit(1742032115.637:6748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10395 comm="syz.9.12802" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2900.918680][ T28] audit: type=1326 audit(1742032115.637:6749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10395 comm="syz.9.12802" exe="/root/syz-executor" sig=0 arch=c000003e syscall=144 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2900.942329][ T28] audit: type=1326 audit(1742032115.637:6750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10395 comm="syz.9.12802" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2900.966042][ T28] audit: type=1326 audit(1742032115.637:6751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10395 comm="syz.9.12802" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2900.996818][ T28] audit: type=1326 audit(1742032115.647:6752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10395 comm="syz.9.12802" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2901.020554][ T28] audit: type=1326 audit(1742032115.647:6753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10395 comm="syz.9.12802" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2901.044537][ T28] audit: type=1326 audit(1742032115.647:6754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10395 comm="syz.9.12802" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2901.137144][T10402] loop9: detected capacity change from 0 to 512 [ 2901.183234][ T28] audit: type=1326 audit(1742032115.647:6755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10395 comm="syz.9.12802" exe="/root/syz-executor" sig=0 arch=c000003e syscall=203 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2901.684505][T10402] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a80ec119, mo2=0002] [ 2901.692470][T10402] System zones: 1-12 [ 2901.709563][T10402] EXT4-fs error (device loop9): ext4_xattr_ibody_find:2186: inode #15: comm syz.9.12802: corrupted in-inode xattr [ 2901.722990][T10402] EXT4-fs error (device loop9): ext4_orphan_get:1405: comm syz.9.12802: couldn't read orphan inode 15 (err -117) [ 2901.736461][T10402] EXT4-fs (loop9): mounted filesystem without journal. Quota mode: writeback. [ 2902.238480][ T7736] Bluetooth: hci0: command 0x1003 tx timeout [ 2902.308566][ T1011] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 2902.620710][T31906] EXT4-fs (loop9): unmounting filesystem. [ 2902.655377][T10420] overlayfs: missing 'lowerdir' [ 2903.061422][T10442] syz.7.12813[10442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2903.063058][T10442] syz.7.12813[10442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2903.235311][T10444] overlayfs: missing 'lowerdir' [ 2905.829288][T10488] syz.7.12831[10488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2905.829444][T10488] syz.7.12831[10488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2906.632506][ T28] kauditd_printk_skb: 36 callbacks suppressed [ 2906.632529][ T28] audit: type=1326 audit(1742032120.057:6792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.12823" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2906.727733][T10478] loop9: detected capacity change from 0 to 512 [ 2906.757963][ T28] audit: type=1326 audit(1742032120.077:6793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.12823" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2906.787937][T10478] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a80ec119, mo2=0002] [ 2906.796007][T10478] System zones: 1-12 [ 2906.801404][T10478] EXT4-fs error (device loop9): ext4_xattr_ibody_find:2186: inode #15: comm syz.9.12823: corrupted in-inode xattr [ 2906.861106][T10478] EXT4-fs error (device loop9): ext4_orphan_get:1405: comm syz.9.12823: couldn't read orphan inode 15 (err -117) [ 2906.873175][T10478] EXT4-fs (loop9): mounted filesystem without journal. Quota mode: writeback. [ 2906.897572][ T28] audit: type=1326 audit(1742032120.087:6794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.12823" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2907.106874][ T28] audit: type=1326 audit(1742032121.897:6795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.12823" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2907.130580][ T28] audit: type=1326 audit(1742032121.897:6796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.12823" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2907.155710][ T28] audit: type=1326 audit(1742032121.897:6797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.12823" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2907.279697][ T28] audit: type=1326 audit(1742032121.897:6798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.12823" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2907.382801][ T28] audit: type=1326 audit(1742032121.897:6799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.12823" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2907.407585][T31906] EXT4-fs (loop9): unmounting filesystem. [ 2907.450032][T10507] netlink: 68 bytes leftover after parsing attributes in process `syz.7.12839'. [ 2907.460112][ T28] audit: type=1326 audit(1742032121.897:6800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.12823" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2907.460148][ T28] audit: type=1326 audit(1742032121.897:6801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10463 comm="syz.9.12823" exe="/root/syz-executor" sig=0 arch=c000003e syscall=101 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2907.735900][T10515] syz.7.12842[10515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2907.736380][T10515] syz.7.12842[10515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2907.748222][T10515] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10515 comm=syz.7.12842 [ 2907.753518][T10515] netlink: 8 bytes leftover after parsing attributes in process `syz.7.12842'. [ 2911.486657][T10533] loop9: detected capacity change from 0 to 512 [ 2912.379382][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 2912.379435][ T28] audit: type=1326 audit(1742032125.237:6810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10522 comm="syz.9.12837" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2912.599576][T10533] EXT4-fs error (device loop9): ext4_orphan_get:1400: inode #15: comm syz.9.12837: casefold flag without casefold feature [ 2912.613243][T10533] EXT4-fs error (device loop9): ext4_orphan_get:1405: comm syz.9.12837: couldn't read orphan inode 15 (err -117) [ 2912.626311][T10533] EXT4-fs (loop9): mounted filesystem without journal. Quota mode: writeback. [ 2913.091915][ T28] audit: type=1326 audit(1742032125.237:6811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10522 comm="syz.9.12837" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2913.115919][ T28] audit: type=1326 audit(1742032125.377:6812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10522 comm="syz.9.12837" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2913.143908][T31906] EXT4-fs (loop9): unmounting filesystem. [ 2913.149895][ T28] audit: type=1326 audit(1742032125.377:6813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10522 comm="syz.9.12837" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2913.203509][ T28] audit: type=1326 audit(1742032125.377:6814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10522 comm="syz.9.12837" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2913.203545][ T28] audit: type=1326 audit(1742032125.797:6815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10522 comm="syz.9.12837" exe="/root/syz-executor" sig=0 arch=c000003e syscall=295 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2913.203574][ T28] audit: type=1326 audit(1742032125.797:6816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10522 comm="syz.9.12837" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2913.203602][ T28] audit: type=1326 audit(1742032125.797:6817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10522 comm="syz.9.12837" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2913.203630][ T28] audit: type=1326 audit(1742032125.967:6818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10522 comm="syz.9.12837" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2913.203658][ T28] audit: type=1326 audit(1742032125.967:6819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10522 comm="syz.9.12837" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38d618d169 code=0x7ffc0000 [ 2913.344269][T10559] netlink: 68 bytes leftover after parsing attributes in process `syz.4.12856'. [ 2915.270544][T10580] loop9: detected capacity change from 0 to 256 [ 2915.313641][T10579] FAT-fs (loop9): error, invalid access to FAT (entry 0x00000001) [ 2915.328495][T10579] FAT-fs (loop9): Filesystem has been set read-only [ 2916.091271][T10593] netlink: 68 bytes leftover after parsing attributes in process `syz.4.12867'. [ 2918.290846][T10634] device wg2 entered promiscuous mode [ 2918.464313][T10641] loop9: detected capacity change from 0 to 1024 [ 2918.495580][T10641] EXT4-fs: Ignoring removed orlov option [ 2918.511420][T10641] EXT4-fs: Ignoring removed nomblk_io_submit option [ 2918.623305][T10641] EXT4-fs (loop9): mounted filesystem without journal. Quota mode: none. [ 2919.224614][T10663] syz.7.12886[10663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2919.225173][T10663] syz.7.12886[10663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2919.500906][T10671] device wg2 entered promiscuous mode [ 2919.550502][T10674] syz.9.12883[10674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2919.550572][T10674] syz.9.12883[10674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2920.089932][T31906] EXT4-fs (loop9): unmounting filesystem. [ 2920.275257][ T28] kauditd_printk_skb: 85 callbacks suppressed [ 2920.275273][ T28] audit: type=1326 audit(1742032135.067:6905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10692 comm="syz.0.12901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 2920.363717][ T28] audit: type=1326 audit(1742032135.067:6906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10692 comm="syz.0.12901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=302 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 2920.420272][T10697] netlink: 28 bytes leftover after parsing attributes in process `syz.4.12902'. [ 2920.441233][ T28] audit: type=1326 audit(1742032135.067:6907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10692 comm="syz.0.12901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 2921.504109][ T28] audit: type=1326 audit(1742032135.067:6908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10692 comm="syz.0.12901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=144 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 2921.802118][ T28] audit: type=1326 audit(1742032135.067:6909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10692 comm="syz.0.12901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 2922.049996][ T28] audit: type=1326 audit(1742032135.067:6910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10692 comm="syz.0.12901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 2922.074842][ T28] audit: type=1326 audit(1742032135.067:6911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10692 comm="syz.0.12901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 2922.179899][ T28] audit: type=1326 audit(1742032135.067:6912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10692 comm="syz.0.12901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 2922.201827][T10716] loop9: detected capacity change from 0 to 512 [ 2922.203910][ T28] audit: type=1326 audit(1742032135.067:6913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10692 comm="syz.0.12901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 2922.233834][T10716] ext2: Unknown parameter 'smackfsfloor' [ 2922.239884][ T28] audit: type=1326 audit(1742032135.067:6914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10692 comm="syz.0.12901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=203 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 2922.357106][T10726] syz.4.12907[10726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2922.357183][T10726] syz.4.12907[10726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2922.361310][T10728] netlink: 28 bytes leftover after parsing attributes in process `syz.7.12913'. [ 2922.707220][T10739] overlayfs: failed to resolve './file1': -2 [ 2924.178367][T10761] netlink: 28 bytes leftover after parsing attributes in process `syz.1.12925'. [ 2924.266411][T10767] overlayfs: failed to resolve './file1': -2 [ 2924.569286][T10794] syz.7.12935[10794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2924.569362][T10794] syz.7.12935[10794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2924.981438][T10795] bridge0: port 1(bridge_slave_0) entered blocking state [ 2925.040851][T10795] bridge0: port 1(bridge_slave_0) entered disabled state [ 2925.058055][T10795] device bridge_slave_0 entered promiscuous mode [ 2925.066106][T10795] bridge0: port 2(bridge_slave_1) entered blocking state [ 2925.073091][T10795] bridge0: port 2(bridge_slave_1) entered disabled state [ 2925.080527][T10795] device bridge_slave_1 entered promiscuous mode [ 2926.437394][ T28] kauditd_printk_skb: 57 callbacks suppressed [ 2926.437411][ T28] audit: type=1326 audit(1742032141.227:6972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10799 comm="syz.0.12941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 2926.468910][ T28] audit: type=1326 audit(1742032141.227:6973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10799 comm="syz.0.12941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 2926.576725][T10805] netlink: 28 bytes leftover after parsing attributes in process `syz.4.12942'. [ 2926.598459][T10805] netlink: 8 bytes leftover after parsing attributes in process `syz.4.12942'. [ 2926.669136][T10816] overlayfs: failed to resolve './file1': -2 [ 2926.714057][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2926.722252][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2926.749243][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2926.758203][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2926.768699][T26618] bridge0: port 1(bridge_slave_0) entered blocking state [ 2926.775551][T26618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2926.783837][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2927.020464][T10828] syz.0.12947[10828] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2927.021796][T10828] syz.0.12947[10828] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2929.499808][ T28] audit: type=1326 audit(1742032141.577:6974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10825 comm="syz.7.12952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2930.661298][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2930.678728][T26618] bridge0: port 2(bridge_slave_1) entered blocking state [ 2930.685609][T26618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2930.710536][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2930.718291][ T28] audit: type=1326 audit(1742032141.577:6975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10825 comm="syz.7.12952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=302 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2930.751596][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2930.881120][ T28] audit: type=1326 audit(1742032141.577:6976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10825 comm="syz.7.12952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2930.966981][ T28] audit: type=1326 audit(1742032141.577:6977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10825 comm="syz.7.12952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=144 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2931.016060][T10795] device veth0_vlan entered promiscuous mode [ 2931.030682][ T28] audit: type=1326 audit(1742032141.577:6978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10825 comm="syz.7.12952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2931.056420][T10795] device veth1_macvtap entered promiscuous mode [ 2931.097503][ T28] audit: type=1326 audit(1742032141.577:6979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10825 comm="syz.7.12952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2931.153453][ T28] audit: type=1326 audit(1742032141.577:6980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10825 comm="syz.7.12952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2931.177299][T10838] netlink: 8 bytes leftover after parsing attributes in process `syz.0.12953'. [ 2931.190002][ T28] audit: type=1326 audit(1742032141.577:6981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10825 comm="syz.7.12952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2931.191707][T30409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2931.238910][T30409] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2931.259422][T30409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2931.268838][T30409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2931.277181][T30409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2931.285256][T30409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2931.293669][T30409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2931.301801][T30409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2931.309974][T30409] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2931.317599][T30409] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2931.326845][T30409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2931.335458][T30409] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2931.343690][T30409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2931.353053][T10847] netlink: 28 bytes leftover after parsing attributes in process `syz.7.12957'. [ 2931.364213][T10847] netlink: 8 bytes leftover after parsing attributes in process `syz.7.12957'. [ 2931.386402][T10859] syz.4.12956[10859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2931.386470][T10859] syz.4.12956[10859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2931.407542][T30409] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2931.434353][T30409] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2932.298493][T10877] net_ratelimit: 595 callbacks suppressed [ 2932.298517][T10877] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 2932.680240][ T28] kauditd_printk_skb: 26 callbacks suppressed [ 2932.680257][ T28] audit: type=1326 audit(1742032147.477:7008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10880 comm="syz.7.12967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2932.808627][ T28] audit: type=1326 audit(1742032147.507:7009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10880 comm="syz.7.12967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2934.247484][T10891] loop9: detected capacity change from 0 to 256 [ 2934.278393][T10891] exFAT-fs (loop9): failed to load upcase table (idx : 0x0000fd4f, chksum : 0x3963664b, utbl_chksum : 0xe619d30d) [ 2934.587122][ T28] audit: type=1326 audit(1742032147.507:7010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10880 comm="syz.7.12967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=302 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2934.688616][ T28] audit: type=1326 audit(1742032147.507:7011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10880 comm="syz.7.12967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2934.848555][ T28] audit: type=1326 audit(1742032147.507:7012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10880 comm="syz.7.12967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2935.295335][ T28] audit: type=1326 audit(1742032147.507:7013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10880 comm="syz.7.12967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=144 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2935.386843][ T28] audit: type=1326 audit(1742032147.507:7014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10880 comm="syz.7.12967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2935.421176][ T28] audit: type=1326 audit(1742032147.507:7015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10880 comm="syz.7.12967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2935.444688][ T28] audit: type=1326 audit(1742032147.507:7016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10880 comm="syz.7.12967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2935.469169][ T28] audit: type=1326 audit(1742032147.507:7017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10880 comm="syz.7.12967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 2937.422391][T10930] syz.1.12980[10930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2937.422867][T10930] syz.1.12980[10930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2938.584846][T10946] syz.1.12986[10946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2938.597525][T10946] syz.1.12986[10946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2938.708717][T10947] syz.4.12981[10947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2938.721623][T10947] syz.4.12981[10947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2941.055728][T10980] xt_hashlimit: max too large, truncated to 1048576 [ 2941.524516][T10984] syz.7.12997[10984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2941.524609][T10984] syz.7.12997[10984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2945.255854][T11013] netlink: 256 bytes leftover after parsing attributes in process `syz.1.13006'. [ 2945.484837][T11015] netlink: 4 bytes leftover after parsing attributes in process `syz.0.13007'. [ 2945.759830][T11020] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 2947.268982][T11036] syz.0.13013[11036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2947.269178][T11036] syz.0.13013[11036] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2948.458517][T11035] SELinux: Context system_u:object_r:system_dbusd_var_run_t:s0 is not valid (left unmapped). [ 2948.668852][ T28] kauditd_printk_skb: 18 callbacks suppressed [ 2948.669682][ T7736] Bluetooth: hci0: command 0x1003 tx timeout [ 2948.689226][ T28] audit: type=1400 audit(1742032163.277:7036): avc: denied { relabelto } for pid=11022 comm="syz.7.13011" name="file0" dev="tmpfs" ino=1190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:system_dbusd_var_run_t:s0" [ 2948.766451][ T1011] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 2948.785905][ T28] audit: type=1400 audit(1742032163.277:7037): avc: denied { associate } for pid=11022 comm="syz.7.13011" name="file0" dev="tmpfs" ino=1190 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:system_dbusd_var_run_t:s0" [ 2948.814459][ T28] audit: type=1400 audit(1742032163.557:7038): avc: denied { rmdir } for pid=7810 comm="syz-executor" name="file0" dev="tmpfs" ino=1190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:system_dbusd_var_run_t:s0" [ 2948.842910][T11048] netlink: 4 bytes leftover after parsing attributes in process `syz.9.13019'. [ 2950.013327][ T28] audit: type=1107 audit(1742032164.637:7039): pid=11031 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 2950.373269][T11073] loop9: detected capacity change from 0 to 512 [ 2950.483560][T11073] EXT4-fs: Ignoring removed i_version option [ 2950.823255][T11073] EXT4-fs (loop9): Test dummy encryption mode enabled [ 2950.830038][T11073] EXT4-fs (loop9): encrypted files will use data=ordered instead of data journaling mode [ 2950.842739][T11073] EXT4-fs (loop9): 1 truncate cleaned up [ 2950.848259][T11073] EXT4-fs (loop9): mounted filesystem without journal. Quota mode: none. [ 2951.359740][T10795] EXT4-fs (loop9): unmounting filesystem. [ 2951.490658][T11096] device syz_tun entered promiscuous mode [ 2951.496291][T11096] device vlan2 entered promiscuous mode [ 2951.503013][T11096] device syz_tun left promiscuous mode [ 2952.020260][T11101] syz.0.13028[11101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2952.020343][T11101] syz.0.13028[11101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2952.678327][T11111] netlink: 256 bytes leftover after parsing attributes in process `syz.4.13035'. [ 2953.155313][ T28] audit: type=1400 audit(1742032167.947:7040): avc: denied { write } for pid=11105 comm="syz.1.13037" name="bus" dev="tmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2953.226355][T11106] block device autoloading is deprecated and will be removed. [ 2953.238779][ T28] audit: type=1400 audit(1742032167.947:7041): avc: denied { open } for pid=11105 comm="syz.1.13037" path="/164/file0/bus" dev="tmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2954.672015][ T28] audit: type=1107 audit(1742032169.067:7042): pid=11097 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 2956.720577][ T28] audit: type=1400 audit(1742032171.517:7043): avc: denied { getopt } for pid=11155 comm="syz.1.13051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2957.463279][T11163] netlink: 256 bytes leftover after parsing attributes in process `syz.7.13049'. [ 2961.817916][ T28] audit: type=1107 audit(1742032175.307:7044): pid=11182 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 2961.919209][ T28] audit: type=1400 audit(1742032176.717:7045): avc: denied { create } for pid=11200 comm="syz.0.13065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 2962.845570][T11212] netlink: 256 bytes leftover after parsing attributes in process `syz.4.13066'. [ 2965.097990][T11258] netlink: 256 bytes leftover after parsing attributes in process `syz.7.13079'. [ 2965.469540][T11269] syz.9.13087[11269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2965.469588][T11269] syz.9.13087[11269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2965.674468][T11277] syz.0.13088[11277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2965.686208][T11277] syz.0.13088[11277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2967.827241][T11304] syz.4.13099[11304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2967.838859][T11304] syz.4.13099[11304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2968.309593][T11335] syz.1.13106[11335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2968.321537][T11335] syz.1.13106[11335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2969.129714][T11339] syz.9.13112[11339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2969.141117][T11339] syz.9.13112[11339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2969.462923][ T28] audit: type=1400 audit(1742032184.257:7046): avc: denied { ioctl } for pid=11365 comm="syz.4.13123" path="socket:[149074]" dev="sockfs" ino=149074 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2970.554987][T11390] bpf_get_probe_write_proto: 2 callbacks suppressed [ 2970.555020][T11390] syz.1.13127[11390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2970.561934][T11390] syz.1.13127[11390] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2971.653575][ T28] audit: type=1107 audit(1742032186.447:7047): pid=11388 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 2971.879915][T11415] syz.0.13137[11415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2971.879990][T11415] syz.0.13137[11415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2972.051719][T11417] netlink: 44 bytes leftover after parsing attributes in process `syz.4.13139'. [ 2973.383068][T11448] overlayfs: missing 'lowerdir' [ 2974.146258][T11451] overlayfs: missing 'lowerdir' [ 2976.369869][T11465] syz.9.13151[11465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2976.369954][T11465] syz.9.13151[11465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2977.629794][T11492] overlayfs: missing 'lowerdir' [ 2978.681492][T11508] fuse: Bad value for 'user_id' [ 2979.118511][ T28] audit: type=1400 audit(1742032193.897:7048): avc: denied { write } for pid=11513 comm="syz.4.13168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2979.298780][T11519] syz.7.13169[11519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2979.298854][T11519] syz.7.13169[11519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2980.599885][T11543] overlayfs: missing 'lowerdir' [ 2981.522696][T11561] 9pnet_fd: Insufficient options for proto=fd [ 2982.222390][T11576] syz.7.13186[11576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2982.222456][T11576] syz.7.13186[11576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2982.329804][T11579] overlayfs: missing 'lowerdir' [ 2984.081327][T11598] overlayfs: missing 'lowerdir' [ 2984.296550][T11600] 9pnet_fd: Insufficient options for proto=fd [ 2984.533926][T11613] fuse: Bad value for 'fd' [ 2984.713966][T11611] overlayfs: failed to resolve './file1': -2 [ 2984.843969][T11622] syz.1.13202[11622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2984.844039][T11622] syz.1.13202[11622] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2985.321186][T11631] overlayfs: missing 'lowerdir' [ 2986.868546][T11664] overlayfs: missing 'lowerdir' [ 2986.883638][T11666] netlink: 68 bytes leftover after parsing attributes in process `syz.1.13217'. [ 2987.249562][T11671] overlayfs: failed to clone upperpath [ 2987.698574][T11681] overlayfs: missing 'lowerdir' [ 2989.087038][T11700] netlink: 68 bytes leftover after parsing attributes in process `syz.4.13229'. [ 2989.155123][T11706] overlayfs: failed to clone upperpath [ 2990.285162][T11733] overlayfs: missing 'lowerdir' [ 2990.685421][T11735] overlayfs: missing 'lowerdir' [ 2990.863186][T11739] netlink: 68 bytes leftover after parsing attributes in process `syz.9.13240'. [ 2991.049351][T11751] overlayfs: failed to clone upperpath [ 2991.433706][T11757] fuse: Bad value for 'fd' [ 2991.438492][T11758] netlink: 44 bytes leftover after parsing attributes in process `syz.0.13247'. [ 2991.460217][T11762] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 2992.118004][T11775] netlink: 68 bytes leftover after parsing attributes in process `syz.1.13253'. [ 2992.296623][T11779] overlayfs: missing 'lowerdir' [ 2993.518493][ T7736] Bluetooth: hci0: command 0x1003 tx timeout [ 2993.518547][ T1011] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 2993.559663][T11805] netlink: 68 bytes leftover after parsing attributes in process `syz.1.13264'. [ 2995.344767][T11833] overlayfs: missing 'workdir' [ 2995.405608][T11839] netlink: 68 bytes leftover after parsing attributes in process `syz.7.13277'. [ 2996.821623][T11879] syz.1.13289[11879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2996.821706][T11879] syz.1.13289[11879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3000.098726][T11900] overlayfs: failed to clone upperpath [ 3000.228876][ T28] audit: type=1326 audit(1742032213.767:7049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11893 comm="syz.1.13297" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3000.445391][ T28] audit: type=1326 audit(1742032213.767:7050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11893 comm="syz.1.13297" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3000.661618][T11919] syz.7.13304[11919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3000.661702][T11919] syz.7.13304[11919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3001.034662][ T28] audit: type=1326 audit(1742032213.867:7051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11893 comm="syz.1.13297" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3001.069650][ T28] audit: type=1326 audit(1742032213.867:7052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11893 comm="syz.1.13297" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3001.102018][ T28] audit: type=1326 audit(1742032213.867:7053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11893 comm="syz.1.13297" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3001.126908][ T28] audit: type=1326 audit(1742032213.967:7054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11893 comm="syz.1.13297" exe="/root/syz-executor" sig=0 arch=c000003e syscall=295 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3001.159843][ T28] audit: type=1326 audit(1742032213.967:7055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11893 comm="syz.1.13297" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3001.184809][ T28] audit: type=1326 audit(1742032213.967:7056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11893 comm="syz.1.13297" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3001.208976][ T28] audit: type=1326 audit(1742032214.067:7057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11893 comm="syz.1.13297" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3001.235331][ T28] audit: type=1326 audit(1742032214.067:7058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11893 comm="syz.1.13297" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3002.973416][T11967] overlayfs: failed to clone upperpath [ 3004.542641][T11983] 9pnet_fd: Insufficient options for proto=fd [ 3004.943035][T11996] overlayfs: failed to clone upperpath [ 3005.257918][T12001] overlayfs: failed to clone upperpath [ 3005.263924][ T28] kauditd_printk_skb: 123 callbacks suppressed [ 3005.277248][ T28] audit: type=1326 audit(1742032219.977:7182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11997 comm="syz.7.13332" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3005.613543][T12005] syz.9.13333[12005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3005.613626][T12005] syz.9.13333[12005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3005.865804][ T28] audit: type=1326 audit(1742032219.987:7183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11997 comm="syz.7.13332" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3005.929242][ T28] audit: type=1326 audit(1742032219.987:7184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11997 comm="syz.7.13332" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3005.997332][ T28] audit: type=1326 audit(1742032219.987:7185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11997 comm="syz.7.13332" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3006.069223][ T28] audit: type=1326 audit(1742032219.987:7186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11997 comm="syz.7.13332" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3006.150953][ T28] audit: type=1326 audit(1742032219.987:7187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11997 comm="syz.7.13332" exe="/root/syz-executor" sig=0 arch=c000003e syscall=295 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3006.203504][ T28] audit: type=1326 audit(1742032219.987:7188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11997 comm="syz.7.13332" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3006.246492][ T28] audit: type=1326 audit(1742032219.987:7189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11997 comm="syz.7.13332" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3006.270268][ T28] audit: type=1326 audit(1742032219.987:7190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11997 comm="syz.7.13332" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3006.295881][ T28] audit: type=1326 audit(1742032219.987:7191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11997 comm="syz.7.13332" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3006.302544][T12017] 9pnet_fd: Insufficient options for proto=fd [ 3006.496720][T12024] syz.7.13339[12024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3006.496800][T12024] syz.7.13339[12024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3007.477946][T12052] 9pnet_fd: Insufficient options for proto=fd [ 3008.396065][T12065] syz.1.13353[12065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3008.396151][T12065] syz.1.13353[12065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3009.484055][T12079] syz.9.13359[12079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3009.495438][T12079] syz.9.13359[12079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3010.069672][T12085] 9pnet_fd: Insufficient options for proto=fd [ 3010.858949][ T28] kauditd_printk_skb: 31 callbacks suppressed [ 3010.859025][ T28] audit: type=1326 audit(1742032225.047:7223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12082 comm="syz.0.13361" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3011.164352][ T28] audit: type=1326 audit(1742032225.057:7224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12082 comm="syz.0.13361" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3011.378709][T12110] syz.4.13367[12110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3011.378792][T12110] syz.4.13367[12110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3011.414595][ T28] audit: type=1326 audit(1742032225.057:7225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12082 comm="syz.0.13361" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3011.516869][ T28] audit: type=1326 audit(1742032225.057:7226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12082 comm="syz.0.13361" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3011.612818][ T28] audit: type=1326 audit(1742032225.067:7227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12082 comm="syz.0.13361" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3012.011568][ T28] audit: type=1326 audit(1742032225.067:7228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12082 comm="syz.0.13361" exe="/root/syz-executor" sig=0 arch=c000003e syscall=295 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3012.035484][ T28] audit: type=1326 audit(1742032225.067:7229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12082 comm="syz.0.13361" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3012.784052][ T28] audit: type=1326 audit(1742032225.077:7230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12082 comm="syz.0.13361" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3012.807851][ T28] audit: type=1326 audit(1742032225.077:7231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12082 comm="syz.0.13361" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3012.833423][ T28] audit: type=1326 audit(1742032225.077:7232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12082 comm="syz.0.13361" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3012.927043][T12117] 9pnet_fd: Insufficient options for proto=fd [ 3014.951074][T12161] 9pnet_fd: Insufficient options for proto=fd [ 3015.989852][T12171] overlayfs: failed to clone upperpath [ 3016.000960][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 3016.001070][ T28] audit: type=1326 audit(1742032230.777:7263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12165 comm="syz.4.13391" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3016.095852][T12176] 9pnet_fd: Insufficient options for proto=fd [ 3016.197839][ T28] audit: type=1326 audit(1742032230.777:7264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12165 comm="syz.4.13391" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3016.222956][ T28] audit: type=1326 audit(1742032230.777:7265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12165 comm="syz.4.13391" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3016.246587][ T28] audit: type=1326 audit(1742032230.777:7266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12165 comm="syz.4.13391" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3016.287313][ T28] audit: type=1326 audit(1742032230.777:7267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12165 comm="syz.4.13391" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3016.348270][T12186] syz.9.13395[12186] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3016.348349][T12186] syz.9.13395[12186] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3016.378496][ T28] audit: type=1326 audit(1742032230.777:7268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12165 comm="syz.4.13391" exe="/root/syz-executor" sig=0 arch=c000003e syscall=295 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3016.450097][ T28] audit: type=1326 audit(1742032230.777:7269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12165 comm="syz.4.13391" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3016.503840][ T28] audit: type=1326 audit(1742032230.777:7270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12165 comm="syz.4.13391" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3016.552420][ T28] audit: type=1326 audit(1742032230.777:7271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12165 comm="syz.4.13391" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3016.601885][ T28] audit: type=1326 audit(1742032230.777:7272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12165 comm="syz.4.13391" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3016.785831][T12209] 9pnet_fd: Insufficient options for proto=fd [ 3016.831874][T12216] device ip6gre0 entered promiscuous mode [ 3016.837434][T12216] device vlan2 entered promiscuous mode [ 3016.843669][T12216] device ip6gre0 left promiscuous mode [ 3017.653785][T12230] overlayfs: failed to clone upperpath [ 3017.823366][T12233] syz.9.13411[12233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3017.824154][T12233] syz.9.13411[12233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3018.310407][T12243] 9pnet_fd: Insufficient options for proto=fd [ 3020.734458][T12272] fuse: Unknown parameter 'user_i00000000000000000000' [ 3021.732809][T12293] xt_CT: You must specify a L4 protocol and not use inversions on it [ 3021.930026][T12296] overlayfs: failed to clone upperpath [ 3022.194283][ T28] kauditd_printk_skb: 70 callbacks suppressed [ 3022.201871][ T28] audit: type=1326 audit(1742032236.707:7343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12285 comm="syz.1.13430" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3023.163941][ T28] audit: type=1326 audit(1742032236.707:7344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12285 comm="syz.1.13430" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3023.269903][ T28] audit: type=1326 audit(1742032236.707:7345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12285 comm="syz.1.13430" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3023.279239][T12311] syz.0.13431[12311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3023.293360][ T28] audit: type=1326 audit(1742032236.707:7346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12285 comm="syz.1.13430" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3023.727521][T12311] syz.0.13431[12311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3023.882692][ T28] audit: type=1326 audit(1742032236.707:7347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12285 comm="syz.1.13430" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3024.411708][T12321] fuse: Unknown parameter 'user_i00000000000000000000' [ 3024.545809][ T28] audit: type=1326 audit(1742032236.707:7348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12285 comm="syz.1.13430" exe="/root/syz-executor" sig=0 arch=c000003e syscall=295 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3024.674202][ T28] audit: type=1326 audit(1742032236.707:7349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12285 comm="syz.1.13430" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3024.713560][ T28] audit: type=1326 audit(1742032236.707:7350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12285 comm="syz.1.13430" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3024.757782][ T28] audit: type=1326 audit(1742032236.707:7351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12285 comm="syz.1.13430" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3024.815711][ T28] audit: type=1326 audit(1742032236.707:7352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12285 comm="syz.1.13430" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3025.054494][T12342] overlayfs: failed to clone upperpath [ 3026.685890][T12355] fuse: Unknown parameter 'user_i00000000000000000000' [ 3026.855605][T12359] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=251 sclass=netlink_route_socket pid=12359 comm=syz.9.13455 [ 3027.423961][T12388] syz.9.13460[12388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3027.424042][T12388] syz.9.13460[12388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3027.690681][T12395] overlayfs: failed to clone upperpath [ 3027.779363][ T28] kauditd_printk_skb: 67 callbacks suppressed [ 3027.798108][ T28] audit: type=1326 audit(1742032242.447:7420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12384 comm="syz.1.13466" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3027.989803][T12398] netlink: 24 bytes leftover after parsing attributes in process `syz.7.13468'. [ 3028.047282][ T28] audit: type=1326 audit(1742032242.447:7421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12384 comm="syz.1.13466" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3028.116628][ T28] audit: type=1326 audit(1742032242.447:7422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12384 comm="syz.1.13466" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3028.251448][ T28] audit: type=1326 audit(1742032242.447:7423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12384 comm="syz.1.13466" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3028.274950][ T28] audit: type=1326 audit(1742032242.447:7424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12384 comm="syz.1.13466" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3028.299180][ T28] audit: type=1326 audit(1742032242.447:7425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12384 comm="syz.1.13466" exe="/root/syz-executor" sig=0 arch=c000003e syscall=295 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3028.427932][ T28] audit: type=1326 audit(1742032242.447:7426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12384 comm="syz.1.13466" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3028.496776][ T28] audit: type=1326 audit(1742032242.457:7427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12384 comm="syz.1.13466" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3028.570816][ T28] audit: type=1326 audit(1742032242.457:7428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12384 comm="syz.1.13466" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3028.595936][ T28] audit: type=1326 audit(1742032242.457:7429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12384 comm="syz.1.13466" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3028.624211][T12416] 9pnet: Could not find request transport: fd0x0000000000000006 [ 3029.603169][T12430] netlink: 24 bytes leftover after parsing attributes in process `syz.0.13479'. [ 3030.978938][T12456] syz.7.13487[12456] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3030.979073][T12456] syz.7.13487[12456] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3031.512074][T12455] overlayfs: failed to clone upperpath [ 3032.495718][T12469] netlink: 24 bytes leftover after parsing attributes in process `syz.1.13492'. [ 3034.770966][T12492] syz.4.13499[12492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3034.771154][T12492] syz.4.13499[12492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3034.838201][T12493] netlink: 148 bytes leftover after parsing attributes in process `syz.0.13496'. [ 3036.039235][T12509] syz.9.13502[12509] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3036.040774][T12509] syz.9.13502[12509] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3037.308014][T12518] netlink: 24 bytes leftover after parsing attributes in process `syz.4.13505'. [ 3037.704973][ T28] kauditd_printk_skb: 64 callbacks suppressed [ 3037.704992][ T28] audit: type=1107 audit(1742032252.227:7494): pid=12511 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3039.622498][T12549] netlink: 24 bytes leftover after parsing attributes in process `syz.9.13516'. [ 3039.831504][T12553] syz.4.13515[12553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3039.831580][T12553] syz.4.13515[12553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3040.551571][T12565] kvm [12564]: vcpu0, guest rIP: 0x18e disabled perfctr wrmsr: 0xc2 data 0x0 [ 3040.571738][T12565] kvm [12564]: vcpu0, guest rIP: 0x1be disabled perfctr wrmsr: 0xc2 data 0x4000 [ 3040.748808][ T28] audit: type=1107 audit(1742032255.487:7495): pid=12568 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3041.661078][ T1011] Bluetooth: hci0: sending frame failed (-49) [ 3041.661375][T12582] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 3041.674057][ T7736] Bluetooth: hci0: Opcode 0x1003 failed: -49 [ 3042.400068][T12602] syz.7.13529[12602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3042.400164][T12602] syz.7.13529[12602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3042.613237][T12606] syz.0.13531[12606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3042.626971][T12606] syz.0.13531[12606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3043.407862][T12620] overlayfs: failed to clone upperpath [ 3044.649827][T12649] syz.4.13546[12649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3044.650134][T12649] syz.4.13546[12649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3045.007659][T12651] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 3045.994024][T12663] overlayfs: failed to clone upperpath [ 3046.330424][ T28] audit: type=1400 audit(1742032261.117:7496): avc: denied { bind } for pid=12671 comm="syz.7.13556" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3046.407034][ T28] audit: type=1400 audit(1742032261.117:7497): avc: denied { name_bind } for pid=12671 comm="syz.7.13556" src=128 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 3046.566591][ T28] audit: type=1400 audit(1742032261.117:7498): avc: denied { node_bind } for pid=12671 comm="syz.7.13556" saddr=fe80::bb src=128 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 3046.683017][T12685] netlink: 24 bytes leftover after parsing attributes in process `syz.1.13561'. [ 3046.756102][T12687] syz.4.13560[12687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3046.756494][T12687] syz.4.13560[12687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3047.333096][ T7736] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 3047.384620][T12691] overlayfs: failed to clone upperpath [ 3047.442929][T12698] syz.1.13562[12698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3047.443017][T12698] syz.1.13562[12698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3048.817944][T12719] syz.7.13573[12719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3048.940031][T12719] syz.7.13573[12719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3050.368630][T12732] syz.1.13575[12732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3050.380065][T12732] syz.1.13575[12732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3050.816573][ T1011] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 3051.309685][T12763] syz.7.13585[12763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3051.309771][T12763] syz.7.13585[12763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3052.394537][ T28] audit: type=1107 audit(1742032266.947:7499): pid=12771 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3052.673647][T12783] overlayfs: failed to clone upperpath [ 3055.354140][T12822] overlayfs: failed to clone upperpath [ 3055.865881][ T28] audit: type=1107 audit(1742032270.417:7500): pid=12827 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3055.891765][T12836] netlink: 24 bytes leftover after parsing attributes in process `syz.1.13613'. [ 3055.986858][T12844] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 3056.886051][T12858] overlayfs: failed to clone upperpath [ 3056.914096][T12864] netlink: 24 bytes leftover after parsing attributes in process `syz.1.13623'. [ 3057.218591][ T28] audit: type=1107 audit(1742032272.007:7501): pid=12875 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3057.998481][ T1011] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 3058.159049][T12891] overlayfs: failed to clone upperpath [ 3060.109298][T12922] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 3060.551326][T12935] netlink: 256 bytes leftover after parsing attributes in process `syz.4.13640'. [ 3060.598508][ T28] audit: type=1107 audit(1742032275.377:7502): pid=12919 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3062.568959][ T28] audit: type=1107 audit(1742032277.347:7503): pid=12972 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3062.856452][T12990] netlink: 256 bytes leftover after parsing attributes in process `syz.7.13661'. [ 3064.119799][T13014] device vlan2 entered promiscuous mode [ 3064.233819][T13025] netlink: 256 bytes leftover after parsing attributes in process `syz.4.13678'. [ 3065.868035][T13041] netlink: 148 bytes leftover after parsing attributes in process `syz.1.13684'. [ 3067.346608][T13076] netlink: 256 bytes leftover after parsing attributes in process `syz.0.13693'. [ 3067.677095][T13080] 9pnet_fd: Insufficient options for proto=fd [ 3067.684226][T13080] 9pnet_fd: Insufficient options for proto=fd [ 3068.298188][T13089] fuse: Unknown parameter 'fd0x0000000000000005' [ 3070.986938][T13118] netlink: 148 bytes leftover after parsing attributes in process `syz.9.13702'. [ 3071.480694][T13125] netlink: 24 bytes leftover after parsing attributes in process `syz.4.13708'. [ 3071.598985][T13131] netlink: 256 bytes leftover after parsing attributes in process `syz.7.13710'. [ 3071.738456][ T28] audit: type=1107 audit(1742032286.507:7504): pid=13128 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3074.554958][T13171] netlink: 24 bytes leftover after parsing attributes in process `syz.9.13724'. [ 3075.215175][ T28] audit: type=1326 audit(1742032289.617:7505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13169 comm="syz.0.13725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3075.554996][ T28] audit: type=1326 audit(1742032289.617:7506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13169 comm="syz.0.13725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3075.661260][ T28] audit: type=1326 audit(1742032289.617:7507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13169 comm="syz.0.13725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3075.685540][ T28] audit: type=1326 audit(1742032289.617:7508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13169 comm="syz.0.13725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3075.719229][ T28] audit: type=1326 audit(1742032289.617:7509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13169 comm="syz.0.13725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3075.814830][ T28] audit: type=1326 audit(1742032289.617:7510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13169 comm="syz.0.13725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=295 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3075.838701][ T28] audit: type=1326 audit(1742032289.617:7511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13169 comm="syz.0.13725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3075.862969][ T28] audit: type=1326 audit(1742032289.617:7512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13169 comm="syz.0.13725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3076.172381][ T28] audit: type=1326 audit(1742032289.617:7513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13169 comm="syz.0.13725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7fb8ec98d169 code=0x7ffc0000 [ 3076.227733][T13210] netlink: 24 bytes leftover after parsing attributes in process `syz.9.13739'. [ 3077.627458][T13234] overlayfs: failed to clone upperpath [ 3078.499261][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 3078.499279][ T28] audit: type=1326 audit(1742032292.337:7546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13227 comm="syz.7.13746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3078.558156][ T28] audit: type=1326 audit(1742032292.337:7547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13227 comm="syz.7.13746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3078.596289][ T28] audit: type=1326 audit(1742032292.347:7548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13227 comm="syz.7.13746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3078.620038][ T28] audit: type=1326 audit(1742032292.347:7549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13227 comm="syz.7.13746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3078.643764][ T28] audit: type=1326 audit(1742032292.347:7550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13227 comm="syz.7.13746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3078.701312][ T28] audit: type=1326 audit(1742032292.347:7551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13227 comm="syz.7.13746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=295 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3078.756139][ T28] audit: type=1326 audit(1742032292.347:7552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13227 comm="syz.7.13746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3078.784253][ T28] audit: type=1326 audit(1742032292.347:7553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13227 comm="syz.7.13746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3078.816554][ T28] audit: type=1326 audit(1742032292.347:7554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13227 comm="syz.7.13746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3078.856994][ T28] audit: type=1326 audit(1742032292.347:7555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13227 comm="syz.7.13746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3080.074894][T13280] netlink: 24 bytes leftover after parsing attributes in process `syz.4.13763'. [ 3080.343686][T13298] overlayfs: failed to clone upperpath [ 3081.375177][T13326] netlink: 24 bytes leftover after parsing attributes in process `syz.9.13781'. [ 3081.815865][T13345] overlayfs: failed to clone upperpath [ 3082.493190][T13358] netlink: 24 bytes leftover after parsing attributes in process `syz.4.13793'. [ 3082.526751][T13360] netlink: 24 bytes leftover after parsing attributes in process `syz.1.13794'. [ 3083.793888][T13395] overlayfs: failed to clone upperpath [ 3083.806388][ T28] kauditd_printk_skb: 105 callbacks suppressed [ 3083.809555][ T28] audit: type=1326 audit(1742032298.517:7661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13391 comm="syz.4.13807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3083.839778][ T28] audit: type=1326 audit(1742032298.527:7662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13391 comm="syz.4.13807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3083.865592][ T28] audit: type=1326 audit(1742032298.527:7663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13391 comm="syz.4.13807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3083.965955][ T28] audit: type=1326 audit(1742032298.527:7664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13391 comm="syz.4.13807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3084.195417][ T28] audit: type=1326 audit(1742032298.527:7665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13391 comm="syz.4.13807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3084.296408][ T28] audit: type=1326 audit(1742032298.527:7666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13391 comm="syz.4.13807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=295 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3084.322515][ T28] audit: type=1326 audit(1742032298.527:7667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13391 comm="syz.4.13807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3084.453102][ T28] audit: type=1326 audit(1742032298.527:7668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13391 comm="syz.4.13807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3084.476649][ T28] audit: type=1326 audit(1742032298.527:7669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13391 comm="syz.4.13807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3084.500900][ T28] audit: type=1326 audit(1742032298.527:7670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13391 comm="syz.4.13807" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd1d78d169 code=0x7ffc0000 [ 3084.755143][T13420] netlink: 24 bytes leftover after parsing attributes in process `syz.7.13818'. [ 3087.793350][T13466] overlayfs: failed to clone upperpath [ 3088.553796][T13476] syz.0.13824[13476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3088.553882][T13476] syz.0.13824[13476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3090.076075][ T28] kauditd_printk_skb: 68 callbacks suppressed [ 3090.076095][ T28] audit: type=1107 audit(1742032304.347:7739): pid=13479 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3090.246894][T13496] 9pnet_fd: Insufficient options for proto=fd [ 3090.296689][ T28] audit: type=1326 audit(1742032305.087:7740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13499 comm="syz.7.13844" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3090.363113][ T28] audit: type=1326 audit(1742032305.087:7741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13499 comm="syz.7.13844" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3090.387953][ T28] audit: type=1326 audit(1742032305.117:7742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13499 comm="syz.7.13844" exe="/root/syz-executor" sig=0 arch=c000003e syscall=302 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3090.417982][ T28] audit: type=1326 audit(1742032305.117:7743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13499 comm="syz.7.13844" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3090.441979][T13508] netlink: 24 bytes leftover after parsing attributes in process `syz.1.13847'. [ 3090.452649][ T28] audit: type=1326 audit(1742032305.117:7744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13499 comm="syz.7.13844" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3090.516517][T13513] syz.7.13844[13513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3090.516835][T13513] syz.7.13844[13513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3090.737587][ T28] audit: type=1326 audit(1742032305.117:7745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13499 comm="syz.7.13844" exe="/root/syz-executor" sig=0 arch=c000003e syscall=144 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3090.824886][ T28] audit: type=1326 audit(1742032305.117:7746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13499 comm="syz.7.13844" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3090.962793][ T28] audit: type=1326 audit(1742032305.117:7747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13499 comm="syz.7.13844" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3090.992651][ T28] audit: type=1326 audit(1742032305.117:7748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13499 comm="syz.7.13844" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3092.009880][T13536] 9pnet_fd: Insufficient options for proto=fd [ 3092.166192][T13537] overlayfs: failed to clone upperpath [ 3093.090435][T13548] netlink: 24 bytes leftover after parsing attributes in process `syz.9.13859'. [ 3093.875385][T13566] syz.7.13862[13566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3093.875840][T13566] syz.7.13862[13566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3095.033293][T13574] 9pnet_fd: Insufficient options for proto=fd [ 3095.234919][T13591] netlink: 24 bytes leftover after parsing attributes in process `syz.0.13874'. [ 3095.366648][T13604] 9pnet_fd: Insufficient options for proto=fd [ 3095.375034][T13604] 9pnet_fd: Insufficient options for proto=fd [ 3095.576382][T13610] syz.4.13873[13610] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3095.576466][T13610] syz.4.13873[13610] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3095.897999][T13613] syz.0.13878[13613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3095.959223][T13613] syz.0.13878[13613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3096.208807][ T28] kauditd_printk_skb: 79 callbacks suppressed [ 3096.209498][ T28] audit: type=1107 audit(1742032310.947:7828): pid=13614 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3096.941800][ T28] audit: type=1326 audit(1742032311.737:7829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13634 comm="syz.1.13889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3096.969880][ T28] audit: type=1326 audit(1742032311.757:7830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13634 comm="syz.1.13889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=302 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3097.034220][ T28] audit: type=1326 audit(1742032311.757:7831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13634 comm="syz.1.13889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3097.064778][ T28] audit: type=1326 audit(1742032311.757:7832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13634 comm="syz.1.13889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=144 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3097.088320][ T28] audit: type=1326 audit(1742032311.757:7833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13634 comm="syz.1.13889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3097.117981][ T28] audit: type=1326 audit(1742032311.757:7834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13634 comm="syz.1.13889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3097.165085][ T28] audit: type=1326 audit(1742032311.757:7835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13634 comm="syz.1.13889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3097.192488][T13639] syz.1.13889[13639] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3097.192925][T13639] syz.1.13889[13639] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3097.414436][ T28] audit: type=1326 audit(1742032311.757:7836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13634 comm="syz.1.13889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3097.643573][ T28] audit: type=1326 audit(1742032311.757:7837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13634 comm="syz.1.13889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f30f418d169 code=0x7ffc0000 [ 3099.847004][T13675] overlayfs: failed to clone upperpath [ 3100.390540][T13684] syz.1.13903[13684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3100.391011][T13684] syz.1.13903[13684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3101.205333][T13687] syz.9.13904[13687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3101.216896][T13687] syz.9.13904[13687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3103.515986][T13708] syz.0.13909[13708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3103.527747][T13708] syz.0.13909[13708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3105.097236][ T28] kauditd_printk_skb: 78 callbacks suppressed [ 3105.097987][ T28] audit: type=1107 audit(1742032319.817:7916): pid=13716 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3105.445115][T13733] syz.1.13916[13733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3105.446009][T13733] syz.1.13916[13733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3106.129227][T13735] overlayfs: failed to clone upperpath [ 3106.258963][ T28] audit: type=1326 audit(1742032320.917:7917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13731 comm="syz.9.13917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3106.538404][ T28] audit: type=1326 audit(1742032320.917:7918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13731 comm="syz.9.13917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3106.947287][ T28] audit: type=1326 audit(1742032320.917:7919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13731 comm="syz.9.13917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3106.973139][ T28] audit: type=1326 audit(1742032320.917:7920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13731 comm="syz.9.13917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3107.001076][ T28] audit: type=1326 audit(1742032320.917:7921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13731 comm="syz.9.13917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3107.025309][ T28] audit: type=1326 audit(1742032320.917:7922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13731 comm="syz.9.13917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=295 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3107.049130][ T28] audit: type=1326 audit(1742032320.917:7923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13731 comm="syz.9.13917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3107.154911][ T28] audit: type=1326 audit(1742032320.917:7924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13731 comm="syz.9.13917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3107.178696][ T28] audit: type=1326 audit(1742032320.917:7925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13731 comm="syz.9.13917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3107.281660][T13750] syz.4.13921[13750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3107.281742][T13750] syz.4.13921[13750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3110.781006][ T28] kauditd_printk_skb: 73 callbacks suppressed [ 3110.781025][ T28] audit: type=1326 audit(1742032324.717:7999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13795 comm="syz.9.13937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3111.019027][T13807] syz.1.13935[13807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3111.019185][T13807] syz.1.13935[13807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3111.177273][T13808] syz.9.13937[13808] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3111.191343][T13808] syz.9.13937[13808] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3112.528884][T13807] overlayfs: failed to clone upperpath [ 3114.049996][ T28] audit: type=1326 audit(1742032324.727:8000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13795 comm="syz.9.13937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3114.084920][ T28] audit: type=1326 audit(1742032325.557:8001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13795 comm="syz.9.13937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3114.231987][ T28] audit: type=1326 audit(1742032325.557:8002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13795 comm="syz.9.13937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3114.411217][ T28] audit: type=1326 audit(1742032325.557:8003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13795 comm="syz.9.13937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3115.421521][ T28] audit: type=1326 audit(1742032325.557:8004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13795 comm="syz.9.13937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=307 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3115.538713][ T28] audit: type=1326 audit(1742032328.717:8005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13795 comm="syz.9.13937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3115.717271][ T28] audit: type=1326 audit(1742032328.717:8006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13795 comm="syz.9.13937" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3115.760089][ T28] audit: type=1107 audit(1742032329.297:8007): pid=13820 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3115.936091][T13853] syz.4.13951[13853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3115.936603][T13853] syz.4.13951[13853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3116.908567][ T28] audit: type=1107 audit(1742032331.207:8008): pid=13856 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3120.800327][T13906] syz.0.13968[13906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3120.801771][T13906] syz.0.13968[13906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3121.675816][ T28] audit: type=1400 audit(1742032336.467:8009): avc: denied { unlink } for pid=13917 comm="syz.0.13973" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 3122.947316][ T28] audit: type=1107 audit(1742032337.737:8010): pid=13933 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3123.827909][T13966] overlayfs: missing 'lowerdir' [ 3126.638444][ T28] audit: type=1107 audit(1742032340.567:8011): pid=13982 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3133.751662][ T28] audit: type=1107 audit(1742032348.057:8012): pid=14020 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3137.578563][ T28] audit: type=1107 audit(1742032352.347:8013): pid=14078 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3138.336961][T14113] syz.0.14031[14113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3138.337385][T14113] syz.0.14031[14113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3139.239487][T14130] netlink: 148 bytes leftover after parsing attributes in process `syz.4.14035'. [ 3139.260303][T14128] netlink: 256 bytes leftover after parsing attributes in process `syz.1.14034'. [ 3143.851349][ T28] audit: type=1400 audit(1742032358.647:8014): avc: denied { connect } for pid=14156 comm="syz.4.14045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3143.913451][ T28] audit: type=1400 audit(1742032358.667:8015): avc: denied { read } for pid=14156 comm="syz.4.14045" path="socket:[155637]" dev="sockfs" ino=155637 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3145.478461][T14173] netlink: 256 bytes leftover after parsing attributes in process `syz.1.14050'. [ 3146.218407][T14175] syz.9.14047[14175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3146.218574][T14175] syz.9.14047[14175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3146.802468][T14186] device ip6tnl0 entered promiscuous mode [ 3146.819746][T14186] device vlan2 entered promiscuous mode [ 3146.825859][T14186] device ip6tnl0 left promiscuous mode [ 3146.841717][T14158] overlayfs: failed to clone upperpath [ 3148.605484][T14216] syz.1.14058[14216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3148.605581][T14216] syz.1.14058[14216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3148.756214][T14217] netlink: 256 bytes leftover after parsing attributes in process `syz.4.14063'. [ 3149.828795][T14220] syz.9.14062[14220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3149.828940][T14220] syz.9.14062[14220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3154.522917][T14261] netlink: 256 bytes leftover after parsing attributes in process `syz.9.14075'. [ 3155.101493][T14270] 9pnet_fd: Insufficient options for proto=fd [ 3156.294050][ T28] audit: type=1326 audit(1742032371.087:8016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14287 comm="syz.7.14084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3156.379312][ T28] audit: type=1326 audit(1742032371.117:8017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14287 comm="syz.7.14084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3156.465657][ T28] audit: type=1326 audit(1742032371.117:8018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14287 comm="syz.7.14084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3156.496052][ T28] audit: type=1326 audit(1742032371.117:8019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14287 comm="syz.7.14084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3156.520850][ T28] audit: type=1326 audit(1742032371.117:8020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14287 comm="syz.7.14084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3156.577930][T14301] syz.0.14083[14301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3156.578008][T14301] syz.0.14083[14301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3157.402298][T14310] 9pnet_fd: Insufficient options for proto=fd [ 3157.439005][ T28] audit: type=1326 audit(1742032371.117:8021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14287 comm="syz.7.14084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=439 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3157.658430][ T28] audit: type=1326 audit(1742032371.117:8022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14287 comm="syz.7.14084" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fea8ef8d169 code=0x7ffc0000 [ 3159.248817][T14329] 9pnet_fd: Insufficient options for proto=fd [ 3159.314486][T14333] 9pnet: Could not find request transport: fd0x0000000000000003 [ 3159.337337][T14335] netlink: 24 bytes leftover after parsing attributes in process `syz.4.14099'. [ 3161.031142][T14366] 9pnet_fd: Insufficient options for proto=fd [ 3161.068850][T14369] 9pnet: Could not find request transport: fd0x0000000000000003 [ 3162.198638][ T28] audit: type=1400 audit(1742032376.977:8023): avc: denied { sys_chroot } for pid=14389 comm="dhcpcd" capability=18 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 3162.240119][ T28] audit: type=1400 audit(1742032376.987:8024): avc: denied { setgid } for pid=14389 comm="dhcpcd" capability=6 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 3162.267134][ T28] audit: type=1400 audit(1742032376.987:8025): avc: denied { setuid } for pid=14389 comm="dhcpcd" capability=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 3162.300720][ T28] audit: type=1400 audit(1742032376.987:8026): avc: denied { setrlimit } for pid=14389 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=process permissive=1 [ 3162.325453][ T28] audit: type=1400 audit(1742032377.117:8027): avc: denied { search } for pid=14390 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3162.389846][ T28] audit: type=1400 audit(1742032377.117:8028): avc: denied { getattr } for pid=14390 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=431 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3162.442818][ T28] audit: type=1400 audit(1742032377.127:8029): avc: denied { write } for pid=14393 comm="rm" name="resolv.conf" dev="tmpfs" ino=422 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3162.469508][ T28] audit: type=1400 audit(1742032377.127:8030): avc: denied { remove_name } for pid=14393 comm="rm" name="eth0.dhcp" dev="tmpfs" ino=431 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3162.502585][ T28] audit: type=1400 audit(1742032377.127:8031): avc: denied { unlink } for pid=14393 comm="rm" name="eth0.dhcp" dev="tmpfs" ino=431 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3162.571474][ T28] audit: type=1400 audit(1742032377.137:8032): avc: denied { getattr } for pid=14390 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=422 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3162.632182][T14414] 9pnet_fd: Insufficient options for proto=fd [ 3165.193455][T14455] overlayfs: missing 'lowerdir' [ 3166.324998][T14470] 9pnet_fd: Insufficient options for proto=fd [ 3172.368743][T14501] overlayfs: missing 'lowerdir' [ 3173.618508][T14509] 9pnet_fd: Insufficient options for proto=fd [ 3181.478153][T14572] overlayfs: missing 'lowerdir' [ 3187.692203][T14590] bridge0: port 1(bridge_slave_0) entered blocking state [ 3187.782809][T14590] bridge0: port 1(bridge_slave_0) entered disabled state [ 3187.896080][T14590] device bridge_slave_0 entered promiscuous mode [ 3187.990806][T14590] bridge0: port 2(bridge_slave_1) entered blocking state [ 3188.074370][T14590] bridge0: port 2(bridge_slave_1) entered disabled state [ 3188.183610][T14590] device bridge_slave_1 entered promiscuous mode [ 3188.889295][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3188.912447][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3188.979459][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3188.991452][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3189.026718][T26618] bridge0: port 1(bridge_slave_0) entered blocking state [ 3189.033604][T26618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3189.116986][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3189.151687][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3189.191207][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3189.228167][T26618] bridge0: port 2(bridge_slave_1) entered blocking state [ 3189.235052][T26618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3189.349179][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3189.379701][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3189.399109][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3189.467624][T14590] device veth0_vlan entered promiscuous mode [ 3189.487393][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3189.508060][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3189.536728][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3189.783195][T14590] device veth1_macvtap entered promiscuous mode [ 3192.407688][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3192.702038][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3192.748739][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3192.788704][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3192.818726][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3192.857361][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3192.878877][T26618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3193.166402][T14655] device wg2 left promiscuous mode [ 3193.342005][T14656] bridge0: port 1(bridge_slave_0) entered blocking state [ 3193.349054][T14656] bridge0: port 1(bridge_slave_0) entered disabled state [ 3193.356502][T14656] device bridge_slave_0 entered promiscuous mode [ 3193.363584][T14656] bridge0: port 2(bridge_slave_1) entered blocking state [ 3193.370505][T14656] bridge0: port 2(bridge_slave_1) entered disabled state [ 3193.377591][T14656] device bridge_slave_1 entered promiscuous mode [ 3195.495757][T14656] device veth0_vlan entered promiscuous mode [ 3195.509288][T14656] device veth1_macvtap entered promiscuous mode [ 3195.528536][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3195.549102][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3195.577288][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3195.664855][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3195.684411][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3195.694406][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3195.701972][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3195.710383][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3196.012019][T13810] bridge0: port 1(bridge_slave_0) entered blocking state [ 3196.018952][T13810] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3196.033403][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3196.041898][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3196.050670][T13810] bridge0: port 2(bridge_slave_1) entered blocking state [ 3196.057539][T13810] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3196.065049][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3196.073127][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3196.081357][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3196.089540][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3196.097520][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3196.105939][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3196.114448][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3196.122691][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3196.131165][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3196.139430][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3196.150401][T13810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3198.719036][T14746] syz.7.14215[14746] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3198.719125][T14746] syz.7.14215[14746] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3198.867646][T14746] overlayfs: failed to clone upperpath [ 3202.334406][T14788] syz.1.14225[14788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3202.335620][T14788] syz.1.14225[14788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3202.544549][T14800] syz.0.14233[14800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3202.556026][T14800] syz.0.14233[14800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3202.569201][T14800] syz.0.14233[14800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3202.586563][T14800] syz.0.14233[14800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3204.387795][T14836] netlink: 256 bytes leftover after parsing attributes in process `syz.9.14243'. [ 3204.853767][T14846] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14846 comm=syz.7.14244 [ 3205.742981][T14862] device vlan2 entered promiscuous mode [ 3207.407764][T14882] netlink: 256 bytes leftover after parsing attributes in process `syz.1.14257'. [ 3207.565181][T14884] syz.0.14258[14884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3207.565290][T14884] syz.0.14258[14884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3207.722509][T14886] 9pnet_fd: Insufficient options for proto=fd [ 3208.097808][T14895] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14895 comm=syz.4.14261 [ 3209.931240][T14926] overlayfs: missing 'lowerdir' [ 3210.388589][T14935] netlink: 256 bytes leftover after parsing attributes in process `syz.9.14273'. [ 3210.522947][T14943] syz.4.14276[14943] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3210.523053][T14943] syz.4.14276[14943] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3210.597179][T14947] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14947 comm=syz.0.14278 [ 3211.501160][T14959] 9pnet: Could not find request transport: fd0x0000000000000003 [ 3211.516996][T14960] device ip6gre0 entered promiscuous mode [ 3211.523082][T14960] device vlan2 entered promiscuous mode [ 3211.529369][T14960] device ip6gre0 left promiscuous mode [ 3212.443955][T14980] block device autoloading is deprecated and will be removed. [ 3212.462649][T14980] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x800 phys_seg 1 prio class 2 [ 3212.684536][T14988] syz.9.14293[14988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3212.687538][T14988] syz.9.14293[14988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3213.416028][T14988] overlayfs: failed to clone upperpath [ 3213.468343][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 3213.468360][ T28] audit: type=1326 audit(1742032427.587:8040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14983 comm="syz.9.14293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3213.823636][ T28] audit: type=1326 audit(1742032427.597:8041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14983 comm="syz.9.14293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3213.847917][ T28] audit: type=1326 audit(1742032427.627:8042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14983 comm="syz.9.14293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3213.891588][ T28] audit: type=1326 audit(1742032427.627:8043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14983 comm="syz.9.14293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3213.916835][ T28] audit: type=1326 audit(1742032427.627:8044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14983 comm="syz.9.14293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3213.982356][ T28] audit: type=1326 audit(1742032427.667:8045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14983 comm="syz.9.14293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=295 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3214.006990][T14997] 9pnet: Could not find request transport: fd0x0000000000000003 [ 3214.007663][ T28] audit: type=1326 audit(1742032427.667:8046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14983 comm="syz.9.14293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3214.041528][ T28] audit: type=1326 audit(1742032427.667:8047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14983 comm="syz.9.14293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3214.065977][ T28] audit: type=1326 audit(1742032427.677:8048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14983 comm="syz.9.14293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3214.096389][T15000] syz.9.14295[15000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3214.096758][T15000] syz.9.14295[15000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3214.281196][ T28] audit: type=1326 audit(1742032427.677:8049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14983 comm="syz.9.14293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c5b18d169 code=0x7ffc0000 [ 3214.395796][T14995] netlink: 256 bytes leftover after parsing attributes in process `syz.4.14294'. [ 3214.422041][T15009] netlink: 24 bytes leftover after parsing attributes in process `syz.1.14301'. [ 3215.094954][T15024] syz.9.14305[15024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3215.095037][T15024] syz.9.14305[15024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3215.118524][T15024] overlayfs: failed to clone upperpath [ 3216.571828][T15038] 9pnet: Could not find request transport: fd0x0000000000000003 [ 3216.816952][T15056] loop0: detected capacity change from 0 to 512 [ 3217.594551][T15067] syz.4.14320[15067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3217.595939][T15067] syz.4.14320[15067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3218.954366][T15057] fuse: Bad value for 'fd' [ 3220.084444][ T28] kauditd_printk_skb: 70 callbacks suppressed [ 3220.084465][ T28] audit: type=1326 audit(1742032433.447:8120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15058 comm="syz.4.14320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3220.221518][ T28] audit: type=1326 audit(1742032433.447:8121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15058 comm="syz.4.14320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3220.245147][ T28] audit: type=1326 audit(1742032433.677:8122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15058 comm="syz.4.14320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3220.285921][ T28] audit: type=1326 audit(1742032433.677:8123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15058 comm="syz.4.14320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3220.309476][ T28] audit: type=1326 audit(1742032433.677:8124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15058 comm="syz.4.14320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3220.333191][ T28] audit: type=1326 audit(1742032433.727:8125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15058 comm="syz.4.14320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=295 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3220.403645][ T28] audit: type=1326 audit(1742032433.727:8126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15058 comm="syz.4.14320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3220.427246][ T28] audit: type=1326 audit(1742032433.727:8127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15058 comm="syz.4.14320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3221.483920][T15078] loop0: detected capacity change from 0 to 512 [ 3221.494564][T15078] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 3221.507598][T15079] 9pnet_fd: Insufficient options for proto=fd [ 3221.528584][ T28] audit: type=1326 audit(1742032433.767:8128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15058 comm="syz.4.14320" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3221.556685][T15078] EXT4-fs (loop0): orphan cleanup on readonly fs [ 3221.564357][T15078] Quota error (device loop0): do_check_range: Getting block 196613 out of range 1-5 [ 3221.573652][T15078] EXT4-fs error (device loop0): ext4_acquire_dquot:6782: comm syz.0.14324: Failed to acquire dquot type 1 [ 3221.585593][T15078] EXT4-fs (loop0): 1 truncate cleaned up [ 3221.591212][T15078] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 3221.753120][T14590] EXT4-fs (loop0): unmounting filesystem. [ 3222.091797][T15100] blackhole_netdev_xmit(): Dropping skb. [ 3222.106554][T15100] blackhole_netdev_xmit(): Dropping skb. [ 3222.157878][T15100] blackhole_netdev_xmit(): Dropping skb. [ 3222.163422][T15100] blackhole_netdev_xmit(): Dropping skb. [ 3222.169006][T15100] blackhole_netdev_xmit(): Dropping skb. [ 3222.174517][T15100] blackhole_netdev_xmit(): Dropping skb. [ 3222.181090][T15100] blackhole_netdev_xmit(): Dropping skb. [ 3222.202253][T15100] blackhole_netdev_xmit(): Dropping skb. [ 3222.222825][T15100] blackhole_netdev_xmit(): Dropping skb. [ 3222.228662][T15100] blackhole_netdev_xmit(): Dropping skb. [ 3222.387150][T15127] 9pnet_fd: Insufficient options for proto=fd [ 3222.574021][T15136] 9pnet: Could not find request transport: fd0x0000000000000008 [ 3222.710688][T15155] 9pnet_fd: Insufficient options for proto=fd [ 3223.662447][T15172] syz.1.14351[15172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3223.662520][T15172] syz.1.14351[15172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3224.168573][T15192] 9pnet_fd: Insufficient options for proto=fd [ 3224.227014][T15197] loop0: detected capacity change from 0 to 512 [ 3224.251323][T15197] EXT4-fs: Ignoring removed i_version option [ 3224.301822][T15197] EXT4-fs (loop0): Test dummy encryption mode enabled [ 3224.317385][T15197] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 3224.362547][T15197] EXT4-fs (loop0): 1 truncate cleaned up [ 3224.368074][T15197] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 3227.600334][T15201] overlayfs: failed to clone upperpath [ 3227.627321][T14590] EXT4-fs (loop0): unmounting filesystem. [ 3227.772923][T15223] netlink: 24 bytes leftover after parsing attributes in process `syz.7.14376'. [ 3227.934221][T15234] 9pnet_fd: Insufficient options for proto=fd [ 3228.034804][T15243] loop0: detected capacity change from 0 to 512 [ 3229.317832][T15243] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 3229.332157][T15243] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a00ec019, mo2=0002] [ 3229.340136][T15243] System zones: 1-12 [ 3229.345479][T15243] EXT4-fs (loop0): 1 truncate cleaned up [ 3229.350997][T15243] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 3229.441615][T15257] syz.1.14382[15257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3229.441708][T15257] syz.1.14382[15257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3229.739200][T14590] EXT4-fs (loop0): unmounting filesystem. [ 3229.771951][T15264] 9pnet_fd: Insufficient options for proto=fd [ 3229.990194][T15283] loop0: detected capacity change from 0 to 2048 [ 3230.012522][T15280] syz.4.14394[15280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3230.012609][T15280] syz.4.14394[15280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3230.025235][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 3230.025252][ T28] audit: type=1326 audit(1742032444.817:8160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15271 comm="syz.4.14394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3230.386519][T15284] net_ratelimit: 595 callbacks suppressed [ 3230.386599][T15284] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 3232.278499][T15283] ------------[ cut here ]------------ [ 3232.283792][T15283] kernel BUG at fs/buffer.c:2714! [ 3232.293187][T15283] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 3232.299078][T15283] CPU: 1 PID: 15283 Comm: syz.0.14398 Not tainted 6.1.128-syzkaller-00012-g4da91a8e563c #0 [ 3232.308887][T15283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 3232.318794][T15283] RIP: 0010:submit_bh_wbc+0x4cd/0x4f0 [ 3232.323993][T15283] Code: c3 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c bd fe ff ff 48 89 df e8 14 bc e6 ff e9 b0 fe ff ff e8 8a 1d 9f ff 0f 0b e8 83 1d 9f ff <0f> 0b e8 7c 1d 9f ff 0f 0b e8 75 1d 9f ff 0f 0b e8 6e 1d 9f ff 0f [ 3232.343431][T15283] RSP: 0018:ffffc90000b676b8 EFLAGS: 00010283 [ 3232.349330][T15283] RAX: ffffffff81d6775d RBX: 0000000000000000 RCX: 0000000000080000 [ 3232.351737][ T28] audit: type=1326 audit(1742032444.817:8161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15271 comm="syz.4.14394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3232.357238][T15283] RDX: ffffc9000b12a000 RSI: 00000000000015ca RDI: 00000000000015cb [ 3232.380827][ T28] audit: type=1326 audit(1742032444.817:8162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15271 comm="syz.4.14394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3232.388396][T15283] RBP: ffffc90000b67708 R08: ffffffff81d67330 R09: ffffed10265b5fba [ 3232.388415][T15283] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 3232.411933][ T28] audit: type=1326 audit(1742032444.817:8163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15271 comm="syz.4.14394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3232.419559][T15283] R13: 1ffff110265b5fb9 R14: ffff888132dafdc8 R15: 0000000000003000 [ 3232.419581][T15283] FS: 00007fe7b88b86c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 3232.427421][ T28] audit: type=1326 audit(1742032444.817:8164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15271 comm="syz.4.14394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3232.450714][T15283] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3232.450732][T15283] CR2: 0000001b2fc1eff8 CR3: 0000000144d04000 CR4: 00000000003506a0 [ 3232.450751][T15283] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3232.450764][T15283] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3232.450778][T15283] Call Trace: [ 3232.450785][T15283] [ 3232.450793][T15283] ? __die_body+0x62/0xb0 [ 3232.450822][T15283] ? die+0x88/0xb0 [ 3232.478311][ T28] audit: type=1326 audit(1742032444.857:8165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15271 comm="syz.4.14394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=295 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3232.490644][T15283] ? do_trap+0x103/0x330 [ 3232.507208][ T28] audit: type=1326 audit(1742032444.857:8166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15271 comm="syz.4.14394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3232.512691][T15283] ? submit_bh_wbc+0x4cd/0x4f0 [ 3232.530781][ T28] audit: type=1326 audit(1742032444.867:8167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15271 comm="syz.4.14394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3232.534129][T15283] ? handle_invalid_op+0x95/0xc0 [ 3232.587925][ T28] audit: type=1326 audit(1742032444.867:8168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15271 comm="syz.4.14394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3232.589508][T15283] ? submit_bh_wbc+0x4cd/0x4f0 [ 3232.643433][ T28] audit: type=1326 audit(1742032444.867:8169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15271 comm="syz.4.14394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb02678d169 code=0x7ffc0000 [ 3232.645571][T15283] ? exc_invalid_op+0x32/0x50 [ 3232.673437][T15283] ? asm_exc_invalid_op+0x1b/0x20 [ 3232.678294][T15283] ? submit_bh_wbc+0xa0/0x4f0 [ 3232.682812][T15283] ? submit_bh_wbc+0x4cd/0x4f0 [ 3232.687442][T15283] ? submit_bh_wbc+0x4cd/0x4f0 [ 3232.692009][T15283] ? submit_bh_wbc+0x4cd/0x4f0 [ 3232.696609][T15283] submit_bh+0x1d/0x30 [ 3232.700512][T15283] ? __wait_on_buffer+0x80/0x80 [ 3232.705200][T15283] ext4_read_bh+0x1b2/0x250 [ 3232.709541][T15283] read_mmp_block+0x155/0x7d0 [ 3232.714056][T15283] ? ext4_multi_mount_protect+0x9c0/0x9c0 [ 3232.719607][T15283] ? rwsem_write_trylock+0x153/0x340 [ 3232.724733][T15283] ext4_multi_mount_protect+0x600/0x9c0 [ 3232.730112][T15283] ? ext4_stop_mmpd+0xb0/0xb0 [ 3232.734632][T15283] ? memset+0x35/0x40 [ 3232.738449][T15283] ? ext4_fast_commit_init+0x25b/0x2e0 [ 3232.743732][T15283] ext4_fill_super+0x5a19/0x8450 [ 3232.748515][T15283] ? ext4_parse_test_dummy_encryption+0xb0/0xb0 [ 3232.754616][T15283] ? snprintf+0xd6/0x120 [ 3232.758667][T15283] ? set_blocksize+0x1cb/0x360 [ 3232.763262][T15283] ? sb_set_blocksize+0xa8/0xf0 [ 3232.767953][T15283] get_tree_bdev+0x440/0x680 [ 3232.772375][T15283] ? ext4_parse_test_dummy_encryption+0xb0/0xb0 [ 3232.778457][T15283] ext4_get_tree+0x1c/0x20 [ 3232.782716][T15283] vfs_get_tree+0x88/0x290 [ 3232.786969][T15283] do_new_mount+0x2ba/0xb30 [ 3232.791308][T15283] ? do_move_mount_old+0x160/0x160 [ 3232.796247][T15283] ? security_capable+0x87/0xb0 [ 3232.800936][T15283] ? ns_capable+0x89/0xe0 [ 3232.805098][T15283] path_mount+0x671/0x1070 [ 3232.809350][T15283] ? user_path_at_empty+0x14e/0x1a0 [ 3232.814388][T15283] __se_sys_mount+0x2c4/0x3b0 [ 3232.818896][T15283] ? __x64_sys_mount+0xd0/0xd0 [ 3232.823498][T15283] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 3232.829405][T15283] __x64_sys_mount+0xbf/0xd0 [ 3232.833826][T15283] x64_sys_call+0x49d/0x9a0 [ 3232.838191][T15283] do_syscall_64+0x3b/0xb0 [ 3232.842419][T15283] ? clear_bhb_loop+0x55/0xb0 [ 3232.846930][T15283] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3232.852659][T15283] RIP: 0033:0x7fe7b798e90a [ 3232.856915][T15283] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3232.876352][T15283] RSP: 002b:00007fe7b88b7e68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3232.884599][T15283] RAX: ffffffffffffffda RBX: 00007fe7b88b7ef0 RCX: 00007fe7b798e90a [ 3232.892413][T15283] RDX: 0000400000001140 RSI: 00004000000007c0 RDI: 00007fe7b88b7eb0 [ 3232.900221][T15283] RBP: 0000400000001140 R08: 00007fe7b88b7ef0 R09: 0000000000410c84 [ 3232.908034][T15283] R10: 0000000000410c84 R11: 0000000000000246 R12: 00004000000007c0 [ 3232.915845][T15283] R13: 00007fe7b88b7eb0 R14: 0000000000000775 R15: 0000400000000340 [ 3232.923661][T15283] [ 3232.926518][T15283] Modules linked in: [ 3233.197578][T15283] ---[ end trace 0000000000000000 ]--- [ 3233.204500][T15283] RIP: 0010:submit_bh_wbc+0x4cd/0x4f0 [ 3233.209945][T15283] Code: c3 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c bd fe ff ff 48 89 df e8 14 bc e6 ff e9 b0 fe ff ff e8 8a 1d 9f ff 0f 0b e8 83 1d 9f ff <0f> 0b e8 7c 1d 9f ff 0f 0b e8 75 1d 9f ff 0f 0b e8 6e 1d 9f ff 0f [ 3233.237984][T15283] RSP: 0018:ffffc90000b676b8 EFLAGS: 00010283 [ 3233.257037][T15283] RAX: ffffffff81d6775d RBX: 0000000000000000 RCX: 0000000000080000 [ 3233.288766][T15283] RDX: ffffc9000b12a000 RSI: 00000000000015ca RDI: 00000000000015cb [ 3233.304945][T15283] RBP: ffffc90000b67708 R08: ffffffff81d67330 R09: ffffed10265b5fba [ 3233.322596][T15283] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 3233.339441][T15283] R13: 1ffff110265b5fb9 R14: ffff888132dafdc8 R15: 0000000000003000 [ 3233.367541][T15283] FS: 00007fe7b88b86c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 3233.376856][T15283] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3233.399851][T15283] CR2: 00007fb0274d35a0 CR3: 0000000144d04000 CR4: 00000000003506b0 [ 3233.415382][T15283] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3233.433030][T15283] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3233.471821][T15283] Kernel panic - not syncing: Fatal exception [ 3233.477986][T15283] Kernel Offset: disabled [ 3233.482123][T15283] Rebooting in 86400 seconds..